• Title/Summary/Keyword: Operating environment

Search Result 2,906, Processing Time 0.028 seconds

Study on the Application of Dry-Ice Blaster for Development of Automatic Stripe-Line Removal (노면표시 제거 장비 개발을 위한 드라이아이스 블래스터 적용에 관한 연구)

  • Koo, Ja Kyung;Moon, Deuk Soo;Bernold, Leonhard E.;Lee, Tai Si
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.2D
    • /
    • pp.245-253
    • /
    • 2009
  • Road facility is the most fundamental infrastructure for traffic and various information for smooth traffic is included in road surfaces. Various information included in road surfaces should be often removed and reinstalled by partial damage and aging. In addition, the existing road surface information should be removed in order to mark new information as traffic information changes. The existing road surface removal method suing grinders and torches had problems such as dangerous working equipment and workers' direct exposure to cars. In addition, although water-jet system using super high-pressure water was used to remove road surface in order of improvement of traditional method, there are another problems such as limitations according to water-tanks and water frost on the road surfaces after work. Therefore, this study analyzes and suggests systems to develop prototype after analyzing dry ice blaster in order to improve the current road surface removal methods. In addition, the study analyzes the possibility of introduction of dry ice blaster through a test for proposing an automatized equipment for new road surface mark removal considering environment and work efficiency, and compare traditional method with introduced dry ice blaster for operating cost.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

Exploring Meaning for Change of Social Awareness of Art Activity (예술활동의 사회적 인식변화를 위한 의미 탐색)

  • Seo, Sang-Gyu;Oh, Kwang-Suk;Sin, Dae-Sik;Hong, Sea-Hee;Sung, Gun-Jae;Jung, Ha-Ni
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.5
    • /
    • pp.167-173
    • /
    • 2019
  • This study aimed to point out the social meaning of acting and art and the change of perception according to the time change. The research method was based on qualitative research through literature review. Based on the findings of this study, the following conclusions should be made. Acting is an art directly linked to the life of an individual. Therefore, the life of an individual is an activity that sublimates his or her life into art through acting. Every activity that we do in our daily life is acting, which is directly related to our talents. In other words, a talented person is recognized as a good actor, and a person with a lack of talent plays the role of an extra person. However, talent is influenced by effort and is also influenced by a given environment. That is, an individual's talent is not fixed but can be changed according to the situation. Education is the area that deals with the possibility of changing these talents. Education has been operating in a variety of ways, but with regard to acting, it has long been centered on apprenticeship education. However, as the 20th century began, systems gradually began to emerge, and in recent years, countries have developed into different educational systems. Therefore, it is necessary to practice the development and operation of various education programs so that the acting and the art are naturally applied in everyday education process and can be applied in daily life.

Fall Risk Assessment (FRA) of Korean community-dwelling elderly (지역 재가 노인의 낙상위험평가)

  • Shin, Sohee;Sato, Susumu
    • 한국노년학
    • /
    • v.39 no.4
    • /
    • pp.895-902
    • /
    • 2019
  • This study reviewed the diagnosis accuracy and evaluation criteria of the fall risk assessment questionnaire that proved validity through factor analysis in previous studies. The purpose of this study was to diagnose high-risk groups and propose personal fall risk profiles for the Korean community-dwelling elderly. The participants of this study were 439 elderly people living in S, U, B, and Y cities Korea (mean age 75.0 ± 5.7 years). Receiver operating characteristic analysis was conducted to review the accuracy of the fall risk assessment and evaluation criteria of the FRA. The results showed that the four sub-factors of the FRA: 'Potential for fall', 'Disease and physical symptoms', 'Environment' and 'Physical function', can effectively diagnose the fall risk of the community-dwelling elderly. The evaluation criteria was presented based on the sensitivity and specificity results. In addition, as a result of analyzing the patterns by the sub factors of the fall risk, the high-risk group accounted for 80% of the elderly who had problems with two or more factors. Therefore, the four sub-factors of FRA can effectively diagnose the fall risk level, and could be present individual fall risk profiles based on the evaluation criteria.

Experimental Study of Metal Surface Wave Communication for Engine room of Vessels (선박 기관실에서의 금속체 표면파 통신 활용 연구)

  • Jin-Woo Kong;Hak-Sun Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.108-109
    • /
    • 2022
  • In this study analyzed experimental data on noise interference caused by engine operating apply surface wave communication in the engine room. For the experiment, 7 areas of the engine room on 256 ton tug boat and measured noise during engine on off using signal analyzer for effect surface wave communication. In order to construct and actual communication network based on the analysis of the noise and confirm the characteristics of surface wave communication in the area made metal bulkheads the actual communication network installed communication equipment between three metal bulkheads and conducted a comparative experiment with wireless communication. The difference was confirmed. As a result, in the case of surface wave communication, there was no significant difference in the transmission and reception rates before and after engine operation in an environment with three bulkheads, but in the case of Wi-Fi using wireless, the performance deteriorated significantly during operation. was confirmed. As a result of analyzing the experimental data, it was confirmed that noise caused by engine operation affects wireless communication but does not affect surface wave communication. Therefore, even in the area with a lot of electromagnetic wave noise in the ship, when the surface wave communication system is configured using the ship's metal structure, it is possible to replace the wireless communication and furthermore, it is possible to apply the surface wave communication in the enclosed space and the engine room in the ship.

  • PDF

Cortex M3 Based Lightweight Security Protocol for Authentication and Encrypt Communication between Smart Meters and Data Concentrate Unit (스마트미터와 데이터 집중 장치간 인증 및 암호화 통신을 위한 Cortex M3 기반 경량 보안 프로토콜)

  • Shin, Dong-Myung;Ko, Sang-Jun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.111-119
    • /
    • 2019
  • The existing smart grid device authentication system is concentrated on DCU, meter reading FEP and MDMS, and the authentication system for smart meters is not established. Although some cryptographic chips have been developed at present, it is difficult to complete the PKI authentication scheme because it is at the low level of simple encryption. Unlike existing power grids, smart grids are based on open two-way communication, increasing the risk of accidents as information security vulnerabilities increase. However, PKI is difficult to apply to smart meters, and there is a possibility of accidents such as system shutdown by sending manipulated packets and sending false information to the operating system. Issuing an existing PKI certificate to smart meters with high hardware constraints makes authentication and certificate renewal difficult, so an ultra-lightweight password authentication protocol that can operate even on the poor performance of smart meters (such as non-IP networks, processors, memory, and storage space) was designed and implemented. As a result of the experiment, lightweight cryptographic authentication protocol was able to be executed quickly in the Cortex-M3 environment, and it is expected that it will help to prepare a more secure authentication system in the smart grid industry.

Stress analysis of high-temperature superconducting wire under electrical/magnetic/bending loads

  • Dongjin Seo;Yunjo Jung;Hong-Gun Kim;Hyung-Seop Shin;Young-Soon Kim
    • Progress in Superconductivity and Cryogenics
    • /
    • v.25 no.4
    • /
    • pp.19-23
    • /
    • 2023
  • The Second-generation high-temperature superconducting (HTS) Rare-Earth Barium Copper Oxide (REBCO) wire is a composite laminate having a multi-layer structure (8 or more layers). HTS wires will undergo multiple loads including the bending-tension loads during winding, high current density, and high magnetic fields. In particular, the wires are subjected to bending stress and magnetic field stress because HTS wires are wound around a circular bobbin when making a high-field magnetic. Each of the different laminated wires inevitably exhibits damage and fracture behavior of wire due to stress deformation, mismatches in thermal, physical, electrical, and magnetic properties. Therefore, when manufacturing high-field magnets and other applications, it is necessary to calculate the stress-strain experienced by high-temperature superconducting wire to present stable operating conditions in the product's use environment. In this study, the finite element model (FEM) was used to simulate the strain-stress characteristics of the HTS wire under high current density and magnetic field, and bending loads. In addition, the result of obtaining the neutral axis of the wire and the simulation result was compared with the theoretical calculation value and reviewed. As a result of the simulation using COMSOL Multiphysics, when a current of 100 A was applied to the wire, the current value showed the difference of 10-9. The stress received by the wire was 501.9 MPa, which showed a theoretically calculated value of 500 MPa and difference of 0.38% between simulation and theoretical method. In addition, the displacement resulted is 30.0012 ㎛, which is very similar to the theoretically calculated value of 30 ㎛. Later, the amount of bending stress by the circular mandrel was received for each layer and the difference with the theoretically obtained the neutral axis result was compared and reviewed. This result will be used as basic data for manufacturing high-field magnets because it can be expanded and analyzed even in the case of wire with magnetic flux pinning.

The Proposal on the Rational Reorganization of the Radio stations Management : Focusing on the Introduction of SDoC for Radio Inspection for Telco (무선국 관리의 합리적 개선방안에 관한 제안 - 무선국의 자기적합성선언 제도 도입 검토를 중심으로 -)

  • Ho-Yeong Kim;Won-Il Roh;Seong-Jhin Choi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.737-746
    • /
    • 2023
  • As the core infrastructure to lead technical innovation for the fourth industrial revolution, economic value and utilizations of radiowaves are increased rapidly. The objectives of this study are to recognize the growing trend of radio stations that transmit information using radiowaves, a limited resource of the country, and to propose developed plans for the radio stations operation system in line with the changing radio technology and use environment. To be specific, the detailed implementation procedures and methods of the system were derived in accordance with the government's plan to convert the complete inspection of radio stations into a SDoC(Self Declaration of Conformity) by the telco. SDoC is a policy that grants autonomy and responsibility for radio waves interference management to existing telecom operator recognized as having radio stations operating capabilities. It has significance in that the function of radio stations inspection, which is a representative technical regulation, is efficiently distributed to the government and the private sector. This study has significance in providing reference for expediting deregulation in the radiowaves management policy.

A Study on Estimating Ship's Emission in the Port Area of Mokpo Port (목포항 항만구역 내 선박 배기가스 배출량 산정에 대한 연구)

  • Bui, Hai-Dang;Kim, Hwayoung
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.3
    • /
    • pp.47-60
    • /
    • 2023
  • A thorough inventory of ship emissions, particularly ship's emission of in-port area is necessary to identify significant sources of exhaust gases such as NOx, SOx, PM, and CO2 and trends in emission levels over time, and reduce their serious effects on the environment and human health. Therefore, the goal of this study is to assess the volume of emissions from ships in Mokpo port, which serves as a gateway to the southwest coast of Korea, using a bottom-up methodology and data from the automatic identification system (AIS) and the Korean Port Management Information System (Port-MIS). In this work, an analysis of ship movement utilizing AIS data and an actual set of data on ship specification were gathered. By examining ship movement using AIS data, We also proposed a new approach for identifying cruising/maneuvering mode. Finally, the results were classified by ship operating mode, by exhaust gas, by ship type, and by berth, which provides a thorough and in-depth analysis of the air pollution caused by ships in Mokpo port.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.