• Title/Summary/Keyword: Detection Mechanism

Search Result 855, Processing Time 0.027 seconds

Development of Self-Driven Pneumatic Robot for Boresonic Examination of Turbine Rotor (터빈로터 중심공 검사용 자기주행 공압형 로봇 개발)

  • Kang, Baejun;An, Myungjae;Lee, Chul-Hee
    • Journal of Drive and Control
    • /
    • v.18 no.1
    • /
    • pp.31-38
    • /
    • 2021
  • This study presents a new principle for driving the robot aimed at reducing the position error for the boresonic examination of turbine rotor. The conventional method of inspection is performed by installing manipulator onto the flange of the turbine rotor and connecting a pipe, which is then being pushed into the bore. The longer the pipe gets, the greater sagging and distortion appear, making it difficult for the ultrasonic sensor to contact with the internal surface of the bore. A pneumatic pressure will ensure the front or rear feet of the robot in close contact with the inner wall to prevent slipping, while the ball screw on the body of the robot will rotate to drive it in the axial direction. The compression force required for tight contact was calculated in the form of a three-point support, and a static structural simulation analysis was performed by designing and modeling the robot mechanism. The driving performance and ultrasonic detection ability have been tested by fabricating the robot, the test piece for ultrasonic calibration and the transparent mock-up for robot demonstration. The tests have confirmed that no slipping occurs at a certain pneumatic pressure or over.

Acyl Homoserine Lactone in Interspecies Bacterial Signaling

  • Kanojiya, Poonam;Banerji, Rajashri;Saroj, Sunil D.
    • Microbiology and Biotechnology Letters
    • /
    • v.50 no.1
    • /
    • pp.1-14
    • /
    • 2022
  • Bacteria communicate with each other through an intricate communication mechanism known as quorum sensing (QS). QS regulates different behavioral aspects in bacteria, such as biofilm formation, sporulation, virulence gene expression, antibiotic production, and bioluminescence. Several different chemical signals and signal detection systems play vital roles in promoting highly efficient intra- and interspecies communication. Gram-negative bacteria coordinate gene regulation through the production of acyl homoserine lactones (AHLs). Gram-positive bacteria do not code for AHL production, while some gram-negative bacteria have an incomplete AHL-QS system. Despite this fact, these microbes can detect AHLs owing to the presence of LuxR solo receptors. Various studies have reported the role of AHLs in interspecies signaling. Moreover, as bacteria live in a polymicrobial community, the production of extracellular compounds to compete for resources is imperative. Thus, AHL-mediated signaling and inhibition are considered to affect virulence in bacteria. In the current review, we focus on the synthesis and regulation mechanisms of AHLs and highlight their role in interspecies bacterial signaling. Exploring interspecies bacterial signaling will further help us understand host-pathogen interactions, thereby contributing to the development of therapeutic strategies intended to target chronic polymicrobial infections.

Partitioning effects and corrosion characteristics of oxyapatite glass-ceramic wasteforms sequestering rare-earth elements

  • Kim, Miae;Kang, Jaehyuk;Yoon, Jang-Hee;Lee, Sang-Geul;Um, Wooyong;Kim, Hyun Gyu
    • Nuclear Engineering and Technology
    • /
    • v.54 no.3
    • /
    • pp.997-1002
    • /
    • 2022
  • Oxyapatite[Ca2Nd8(SiO4)6O2] glass-ceramics have been suggested as wasteforms for the immobilisation of rare-earth radioactive nuclides because of their high waste-loading capability and good chemical durability. In particular, a partitioning effect is predicted to contribute to an enhancement of corrosion resistance in glass-ceramics compared with that of conjugate glasses of the same composition. Because rare-earths are inherently insoluble nuclides, detection of changes in corrosion behavior between glass-ceramics and conjugate glasses under normal conditions is not easy. In this study, therefore, we revealed the partitioning effect by exposing glass-ceramics and glasses to solution of pH 2, 7 and 10 at 90 ℃ for 20 d. In addition, we proposed the corrosion mechanism for oxyapatite glass-ceramics under various corrosion conditions. Especially, the glassy phase dissolved first, followed by the oxyapatite phase during pH 7 corrosion.

Buffer Overflow Attack and Defense Techniques

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.207-212
    • /
    • 2021
  • A buffer overflow attack is carried out to subvert privileged program functions to gain control of the program and thus control the host. Buffer overflow attacks should be prevented by risk managers by eradicating and detecting them before the software is utilized. While calculating the size, correct variables should be chosen by risk managers in situations where fixed-length buffers are being used to avoid placing excess data that leads to the creation of an overflow. Metamorphism can also be used as it is capable of protecting data by attaining a reasonable resistance level [1]. In addition, risk management teams should ensure they access the latest updates for their application server products that support the internet infrastructure and the recent bug reports [2]. Scanners that can detect buffer overflows' flaws in their custom web applications and server products should be used by risk management teams to scan their websites. This paper presents an experiment of buffer overflow vulnerability and attack. The aims to study of a buffer overflow mechanism, types, and countermeasures. In addition, to comprehend the current detection plus prevention approaches that can be executed to prevent future attacks or mitigate the impacts of similar attacks.

Countermeasure against MITM attack Integrity Violation in a BLE Network (BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법)

  • Han, Hyegyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.

Malware Classification using Dynamic Analysis with Deep Learning

  • Asad Amin;Muhammad Nauman Durrani;Nadeem Kafi;Fahad Samad;Abdul Aziz
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.49-62
    • /
    • 2023
  • There has been a rapid increase in the creation and alteration of new malware samples which is a huge financial risk for many organizations. There is a huge demand for improvement in classification and detection mechanisms available today, as some of the old strategies like classification using mac learning algorithms were proved to be useful but cannot perform well in the scalable auto feature extraction scenario. To overcome this there must be a mechanism to automatically analyze malware based on the automatic feature extraction process. For this purpose, the dynamic analysis of real malware executable files has been done to extract useful features like API call sequence and opcode sequence. The use of different hashing techniques has been analyzed to further generate images and convert them into image representable form which will allow us to use more advanced classification approaches to classify huge amounts of images using deep learning approaches. The use of deep learning algorithms like convolutional neural networks enables the classification of malware by converting it into images. These images when fed into the CNN after being converted into the grayscale image will perform comparatively well in case of dynamic changes in malware code as image samples will be changed by few pixels when classified based on a greyscale image. In this work, we used VGG-16 architecture of CNN for experimentation.

Intensive Monitoring Survey of Nearby Galaxies (IMSNG) : On the progenitor system of Type Ia SN 2018kp

  • Choi, Changsu;Im, Myungshin;Kim, Dohyeong;Lim, Gu;Paek, Gregory S.H.;Kim, Sophia;Hwang, Sungyong
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.45 no.1
    • /
    • pp.36.2-36.2
    • /
    • 2020
  • Intensive Monitoring Survey of Nearby Galaxies (IMSNG) has been managed over 6 years. It aimed to constrain the progenitor system and explosion mechanism of SNe by detection of very early signal from shock heated emission. We have conducted monitoring observation of nearby bright galaxies those were carefully selected using global network of 1-m class telescopes. More than 20 SNe have occured in our target fields. As One of result of the survey, we present light curve analysis of type Ia SN 2018kp, which was discovered in NGC 3367. Based on photometric analysis, we calculated explosion parameters and set constraints of physical conditions of this supernova. We compared the results with theoretical model progenitor systems to find out which scenario is the most fitted to SN 2018kp case. Moreover, we estimate the distance to the galaxy and look into the relation between SNe and galactic physical parameters.

  • PDF

Determination of Copper(II) ion with a nafion-ethylenediamine modified glassy carbon electrode (내피온-에틸렌디아민이 수식된 유리탄소전극으로 구리(II) 이온의 정량)

  • Ko, Young Chun;Kim, Hee Cheol
    • Analytical Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.213-218
    • /
    • 2007
  • Copper(II) ion was measured with the use of a perfluorinated sulfonated polymer-ethylenediamine (nafion-en) modified glassy carbon electrode. The electrode mechanism was based on the chemical reactivity of an immobilized layer (nafion-en) to yield complex $[Cu(en)_2]^{+2}$. The reduction potential peak by differential pulse voltammetry(DPV) was observed at -0.4402V(${\pm}0.0050V$) (vs. Ag/AgCl). The linear calibration curve was obtained from $1.0{\times}10^{-6}$ to $1.0{\times}10^{-4}M$ copper(II) ion concentration, and the detection limit(3s) was $1.96{\times}10^{-6}M$.

Characteristics Analysis of Measurement Variables for Detecting Anomaly Signs of Thermal Runaway in Lithium-Ion Batteries (리튬이온 배터리의 열폭주 이상징후 감지를 위한 측정 변수 특성 분석)

  • LIM, BYUNG-JU;CHO, SUNG-HOON;LEE, GA-RAM;CHOI, SEOK-MIN;PARK, CHANG-DAE
    • Journal of Hydrogen and New Energy
    • /
    • v.33 no.1
    • /
    • pp.85-94
    • /
    • 2022
  • To detect anomaly signs of thermal runaway in advance, this study analyzed the signals from various sensors installed in lithium-ion batteries. The thermal runaway mechanism was analyzed, and measurement variables for anomalies of a battery cell were surface temperature, strain, and gas concentration. The changes and characteristics of three variables during the thermal runaway process were analyzed under the abuse environment: the overheat and the overcharge. In experiment, the thermal runaway of the battery proceeded in the initial developing stage, the outgassing stage, and the ignition stage. Analysis from the measured data indicated that the suitable variable to detect all stages of thermal runaway is the surface temperature of the battery, and surface strain is alternative.

Efficient Detection of Heavy Metal Lead Ions in Aqueous Media using Aggregation-Induced Emission (AIE)-based Turn-on Fluorescence Sensor (Aggregation-Induced Emission (AIE) 기반의 Turn-On 형광센서를 이용한 수질 속 중금속 납 이온의 효율적인 검출 )

  • Haemin Choi;Hyeonjeong Seong;Juyeon Cha;Seoung Ho Lee
    • Journal of Environmental Science International
    • /
    • v.32 no.11
    • /
    • pp.757-765
    • /
    • 2023
  • Lead, a heavy metal widely employed in various industries, continues to pose a threat to both human health and the environment. Therefore, the development of a sensor capable of rapidly and accurately detecting lead(II) ions in real-time at contaminated sites is crucial. In this study, we have engineered a fluorescent sensor with the ability to efficiently detect lead(II) ions under actual environmental conditions, including tap water and freshwater. The compound, tetraphenylethylene carboxylic acid derivative (TPE-COOH), exhibits high selectivity and sensitivity toward lead(II) ions in aqueous solution, where the interaction between TPE-COOH and lead(II) ions leads to its aggregation, thus triggering a fluorescence "turn-on" based on the aggregation-induced emission (AIE) mechanism. Impressively, compound TPE-COOH proficiently detects lead(II) ions within a range of 30 to 100 𝜇M in tap water and freshwater, even in the presence of various interfering substances.