• Title/Summary/Keyword: Jiho technique

Search Result 22, Processing Time 0.024 seconds

A Study on Origin and Differentiation of Korean Paper Art (한지공예 기법의 원류 고찰과 한지공예의 분화)

  • Jeon, Cheol
    • Journal of Korea Technical Association of The Pulp and Paper Industry
    • /
    • v.43 no.4
    • /
    • pp.11-22
    • /
    • 2011
  • Jeonji technique was widely used in general Hanji handicraft including Jihwa handicraft. But the technique itself has not been passed on. By contrast, Jiseung technique and Jiho technique have been passed on and continuously developed. And although the Huji technique has not been transmitted, it should be vigorously used as a technique of producing the frame in order to revive the authenticity of traditional Hanji handicraft. Jumchi technique, a method of using water to connect between layers, is an effective technique of diversely expressing the feel of materials of Hanji craftworks. Modern Hanji handicraft has used the characteristics of paper and paperboard diversely produced nowadays as much as possible, which shows that it is more likely to develop as handicraft.

A Study on Log Collection to Analyze Causes of Malware Infection in IoT Devices in Smart city Environments

  • Donghyun Kim;Jiho Shin;Jung Taek Seo
    • Journal of Internet Computing and Services
    • /
    • v.24 no.1
    • /
    • pp.17-26
    • /
    • 2023
  • A smart city is a massive internet of things (IoT) environment, where all terminal devices are connected to a network to create and share information. In accordance with massive IoT environments, millions of IoT devices are connected, and countless data are generated in real time. However, since heterogeneous IoT devices are used, collecting the logs for each IoT device is difficult. Due to these issues, when an IoT device is invaded or is engaged in malicious behavior, such as infection with malware, it is difficult to respond quickly, and additional damage may occur due to information leakage or stopping the IoT device. To solve this problem, in this paper, we propose identifying the attack technique used for initial access to IoT devices through MITRE ATT&CK, collect the logs that can be generated from the identified attack technique, and use them to identify the cause of malware infection.

A Study on SMiShing Detection Technique using TaintDroid (테인트드로이드를 이용한 스미싱 탐지 기법 연구)

  • Cho, Jiho;Shin, Jiyong;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.3-9
    • /
    • 2015
  • In this paper, a detection technique of smishing using a TaintDroid is suggested. Suggesting system detects malicious acts by transmitting a URL to the TaintDroid server and installing a relevant application to a virtual device of the TaintDroid server, when a smartphone user receives a text message including the URL suspected as a smishing. Through this we want to distinguish an application that can not install because of suspicion of a smishing in an actual smartphone whether said application is malicious application or not by testing with the virtual device of said system. The detection technique of a smishing using the TaintDroid suggested in this paper is possible to detect in a new form a smishing with a text message and to identifying which application it is through analysis of results from a user.

Array pattern synthesis using semidefinite programming and a bisection method

  • Lee, Jong-Ho;Choi, Jeongsik;Lee, Woong-Hee;Song, Jiho
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.619-625
    • /
    • 2019
  • In this paper, we propose an array pattern synthesis scheme using semidefinite programming (SDP) under array excitation power constraints. When an array pattern synthesis problem is formulated as an SDP problem, it is known that an additional rank-one constraint is generated inevitably and relaxed via semidefinite relaxation. If the solution to the relaxed SDP problem is not of rank one, then conventional SDP-based array pattern synthesis approaches fail to obtain optimal solutions because the additional rank-one constraint is not handled appropriately. To overcome this drawback, we adopted a bisection technique combined with a penalty function method. Numerical applications are presented to demonstrate the validity of the proposed scheme.

A Study on Website Forgery/Falsification Detection Technique using Images (이미지를 이용한 웹사이트 위·변조 탐지 기법 연구)

  • Shin, JiYong;Cho, Jiho;Lee, Han;Kim, JeongMin;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • In this paper, we propose a forgery/falsification detection technique of web site using the images. The proposed system captures images of the web site when a user accesses to the forgery/falsification web site that has the financial information deodorizing purpose. The captured images are compared with those of normal web site images to detect forgery/falsification. The proposed system calculates similarity factor of normal site image with captured one to detect whether the site is normal or not. If it is determined as normal, analysis procedure is finished. But if it is determined as abnormal, a message informs the user to prevent additional financial information spill and further accidents from the forgery web site.

Real-time implementation of distributed beamforming for simultaneous wireless information and power transfer in interference channels

  • Hong, Yong-Gi;Hwang, SeongJun;Seo, Jiho;Lee, Jonghyeok;Park, Jaehyun
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.389-399
    • /
    • 2021
  • In this paper, we propose one-bit feedback-based distributed beamforming (DBF) techniques for simultaneous wireless information and power transfer in interference channels where the information transfer and power transfer networks coexist in the same frequency spectrum band. In a power transfer network, multiple distributed energy transmission nodes transmit their energy signals to a single energy receiving node capable of harvesting wireless radio frequency energy. Here, by considering the Internet-of-Things sensor network, the energy harvesting/information decoding receivers (ERx/IRx) can report their status (which may include the received signal strength, interference, and channel state information) through one-bit feedback channels. To maximize the amount of energy transferred to the ERx and simultaneously minimize the interference to the IRx, we developed a DBF technique based on one-bit feedback from the ERx/IRx without sharing the information among distributed transmit nodes. Finally, the proposed DBF algorithm in the interference channel is verified through the simulations and also implemented in real time by using GNU radio and universal software radio peripheral.

Numerical analysis on the critical current evaluation and the correction of no-insulation HTS coil

  • Bonghyun Cho;Jiho Lee
    • Progress in Superconductivity and Cryogenics
    • /
    • v.25 no.1
    • /
    • pp.16-20
    • /
    • 2023
  • The International Electrotechnical Commission (IEC) 61788-26:2020 provides guidelines for measuring the critical current of Rare-earth barium copper oxide (REBCO) tapes using two methods: linear ramp and step-hold methods. The critical current measurement criterion, 1 or 0.1 μV/cm of electric field from IEC 61788-26 has been normally applied to REBCO coils or magnets. No-insulation (NI) winding technique has many advantages in aspects of electrical and thermal stability and mechanical integrity. However, the leak current from the NI REBCO coil can cause distortion in critical current measurement due to the characteristic resistance which causes the radial current flow paths. In this paper, we simulated the NI REBCO coil by applying both linear ramp and step-hold methods based on a simplified equivalent circuit model. Using the circuit analysis, we analyzed and evaluated both methods. By using the equivalent circuit model, we can evaluate the critical current of the NI REBCO coil, resulting in an estimation error within 0.1%. We also evaluate the accuracy of critical current measurement using both the linear ramp and step-hold methods. The accuracy of the linear ramp method is influenced by the inductive voltage, whereas the accuracy of the step-hold method depends on the duration of the hold-time. An adequate hold time, typically 5 to 10 times the time constant (τ), makes the step-hold method more accurate than the linear ramp method.

Effect of Application Methods of Stretching Exercise on Angular Variation and Muscle Activation Changes in the Hallux Valgus (신장운동의 적용방식이 무지외반증의 각도와 근활성도 변화에 미치는 영향)

  • Song, Jiyeong;Kim, Younhee;Kim, Juri;An, Eunhye;You, Jiho;Kim, Sungyong;Jeong, Chanjoo;Yang, Hoesong;Yoo, Youngdae;Bae, Seahyun
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.3 no.4
    • /
    • pp.29-35
    • /
    • 2015
  • Purpose: The purpose of this study was to effect of application methods of stretching exercise on angular variation and muscle activation changes in the hallux valgus. Method : This study was performed on twenty subjects. Twenty subjects were divided into two groups; Agonist Contraction(AC)(n=10), Hold-relax with Agonist Contraction(HR-AC)(n=10). Both of the group performed the exercise 5 times a week for 6 weeks. The data was analyzed by the paired t-test for comparing before and after changes of factors in each group and the independent t-test for comparing the between groups. Result : In the within group comparisons, HR-AC group abductor hallucis muscle activity showed significant difference between before and after the intervention(p<0.01). And all the two groups, there were significant decreased in hallux valgus angle(p<0.01). In the comparison of the two groups, there were significant difference among the two groups in abductor hallucis muscle activity(p<0.01). Conclusion : The findings of this study, we found that the HR-AC technique were more effective than AC technique in increase in abductor hallucis muscle activity.

Development of Non-linear Finite Element Modeling Technique for Circular Concrete-filled Tube (CFT) (원형 콘크리트 충전 강관 (CFT)의 비선형 유한 요소 해석 기법 개발)

  • Moon, Jiho;Ko, Heejung;Lee, Hak-Eun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.3A
    • /
    • pp.139-148
    • /
    • 2012
  • Circular concrete-filled tubes (CFTs) are composite members, which consists of a steel tube and concrete infill. CFTs have been used as building columns and bridge piers due to several advantages such as their strength-to-size efficiency and facilitation of rapid construction. Extensive experimental studies about CFT have been conducted for past decades. However experimental results alone are not sufficient to support the engineering of these components. Complementary advanced numerical models are needed to simulate the behavior of CFT to extend the experimental research and develop predictive tools required for design and evaluation of structural systems. In this study, a finite element modeling technique for CFT was developed. The confinement effects, and behavior of CFT subjected various types of loading predicted by the proposed finite element model for CFT were verified by comparing with test results.

An Accurate Log Object Recognition Technique

  • Jiho, Ju;Byungchul, Tak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.89-97
    • /
    • 2023
  • In this paper, we propose factors that make log analysis difficult and design technique for detecting various objects embedded in the logs which helps in the subsequent analysis. In today's IT systems, logs have become a critical source data for many advanced AI analysis techniques. Although logs contain wealth of useful information, it is difficult to directly apply techniques since logs are semi-structured by nature. The factors that interfere with log analysis are various objects such as file path, identifiers, JSON documents, etc. We have designed a BERT-based object pattern recognition algorithm for these objects and performed object identification. Object pattern recognition algorithms are based on object definition, GROK pattern, and regular expression. We find that simple pattern matchings based on known patterns and regular expressions are ineffective. The results show significantly better accuracy than using only the patterns and regular expressions. In addition, in the case of the BERT model, the accuracy of classifying objects reached as high as 99%.