• Title/Summary/Keyword: Performance of protecting

Search Result 290, Processing Time 0.023 seconds

Decrease of Membrane Degradation in PEMFC by Fucoidan (후코이단에 의한 PEMFC 고분자막의 열화 감소)

  • Oh, Sohyung;Kak, Ahyeon;Oh, Sungjun;Lee, Daewoong;Na, Il-Chai;Park, Kwonpil
    • Korean Chemical Engineering Research
    • /
    • v.58 no.1
    • /
    • pp.59-63
    • /
    • 2020
  • Radical scavenger is used to improve the durability of PEMFC polymer membrane. In this study, we investigated whether fucoidan extracted from seaweed as a radical scavenger prevents electrochemical degradation through Fenton and OCV Holding experiments. Fucoidan has an antioxidant effect, protecting the polymer membrane from hydrogen peroxide and oxygen radicals, reducing the degradation rate to 1/10. Fucoidan has been shown to be more effective than MnO2, which is used as a radical scavenger. In the PEMFC cell, the accelerated durability evaluation method (OCV Holding) showed that fucoidan reduced the hydrogen permeability of the polymer membrane by 12% and enhanced the performance by 29.1% compared to without radical scavenger. And fucoidan was found to be more effective in the cathode side ionomer than the anode side.

CNN Based Face Tracking and Re-identification for Privacy Protection in Video Contents (비디오 컨텐츠의 프라이버시 보호를 위한 CNN 기반 얼굴 추적 및 재식별 기술)

  • Park, TaeMi;Phu, Ninh Phung;Kim, HyungWon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.63-68
    • /
    • 2021
  • Recently there is sharply increasing interest in watching and creating video contents such as YouTube. However, creating such video contents without privacy protection technique can expose other people in the background in public, which is consequently violating their privacy rights. This paper seeks to remedy these problems and proposes a technique that identifies faces and protecting portrait rights by blurring the face. The key contribution of this paper lies on our deep-learning technique with low detection error and high computation that allow to protect portrait rights in real-time videos. To reduce errors, an efficient tracking algorithm was used in this system with face detection and face recognition algorithm. This paper compares the performance of the proposed system with and without the tracking algorithm. We believe this system can be used wherever the video is used.

"There Was No Violence, But...": Study on Coercive Control of Intimate Partner Violence and Reconceptualization of Domestic Violence ("폭력이 있었던 것은 아니지만..." : 친밀한 관계에서의 강압적 통제와 가정폭력 재개념화를 위한 연구)

  • Heo, Min-Sook
    • Issues in Feminism
    • /
    • v.12 no.2
    • /
    • pp.69-103
    • /
    • 2012
  • By reviewing relatively recent theory of coercive control, which considers gender as a key concept to conceptualize domestic violence, this article explores battered women's experiences with police responses and institutional law enforcement. Using data and interviews from Korea Women's Hotline, this article analyzes the effects of state intervention which fails to support battered women and sends a message to the community that domestic violence is not such a serious crime. Specifically, this study found some problematic responses and attitudes of police and legal system: first, police is equating domestic violence with physical attacks or serious harms. Second, police and law enforcement personnel blame victims based on her gender performance or gender roles. Third, by individualizing the problem of domestic violence, state intervention ignores important structural factors that cause and perpetuate it. Finally, police and the justice system disempower and discourage battered women by exacerbating victim's fears and risks. Viewing domestic violence as a liberty crime, this study concludes that enhanced understanding of the nature of domestic violence only can contribute to solving the problem and protecting women's human rights.

An Experimental Evaluation on Performance of Surface Protector for Concrete Structures (콘크리트 구조물 표면 보호재의 성능에 대한 실험적 평가)

  • Nam, Yong-Hyuk;Chung, Young-Jun;Jang, Suk-Hwan;An, Young-Ki
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.10 no.5
    • /
    • pp.157-163
    • /
    • 2006
  • This study is on the evaluation of double surface protection method using water repellent primer and final top coat to protect concrete. Water repellent agent has been applied on the final top coat to protect concrete. However, to make up for the weakness to the ultraviolet of the water repellent, the work procedure of these protectors is done vice versa. This combination of protectors was compared with existing ones in this study. Even though the final top coat was applied on the water repellent primer, its adhesive strength met to KS F 4936-' 03 with other protectors used in this study. All surface protectors used in this study were excellent in protecting concrete. Especially, in case of applying with final top coat in conjunction with water repellent primer, the resistance against chloride ion penetration and neutralization by $CO_2$ was more efficient than other surface protectors used in this study under this given condition.

Filter design for protecting signal interference between RF equipments on aircraft (항공기 RF 장비들의 신호 간섭 방지를 위한 필터 설계)

  • Kim, Junhyoung;Kim, Bong-Gyu;Jeon, Young-Gu;Lee, Seong-Woo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.3
    • /
    • pp.246-252
    • /
    • 2013
  • This paper presents method to suppress signal interference by using the filter in the RF output stage of the radiation equipment as a way to avoid interference between the RF(Radio Frequency) equipment mounted on aircraft. Especially filter design to suppress harmonics of the radiation equipment and testing method to verify the filter's performance is presented. Filter was installed at RF output stage of U/VHF radio in order to prevent interference between U/VHF(Ultra/Very High Frequency) radio and data link system. Filter design and testing method in this paper will be able to give help in the design of aircraft equipments as a tool that can be used to establish measures for problem of interference in the aircraft.

Experimental Study on Regenerative Cooling Characteristics for Uni-element Injector Face during prolonged Combustion Time (장시간 연소에 따른 단일 인젝터 분사기면 냉각 특성연구)

  • Jeon, Jun-Su;Shin, Hun-Cheol;Lee, Seok-Jin;Chung, Hae-Seung;Kim, Young-Wook;Ko, Young-Sung;Kim, Yoo
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.399-402
    • /
    • 2006
  • The purpose of this study is to propose a method for protecting injector face for prolonged combustion time and heat flux measurement technique at the injector face. To obtain basic design data and verify the performance of the proposed method, a regenerative cooling injector face was designed and manufactured for the hot firing test. Due to the safety reason, hot fire test were performed 3, 10, 30, 60 and 120 seconds time step. The discrepancy between analytical results adapting to combustion and nozzle and experimental results is believed due to the over estimation of the convection heat transfer calculation. for the injector face, flow velocity is almost negligible, therefore radiation is more important than convection. Consecutive hot firing test during 10, 30, 60 and 120 seconds combustion time shows good repeatability.

  • PDF

Implementation of an Obfuscator for Visual C++ Source Code (비주얼 C++소스 코드를 위한 obfuscator 구현)

  • Chang, Hye-Young;Cho, Seong-Je
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.59-69
    • /
    • 2008
  • Automatic obfuscation is known to be the most viable method for preventing reverse engineering intentional1y making code more difficult to understand for security purposes. In this paper, we study and implement an obfuscation method for protecting MS Visual C++ programs against attack on the intellectual property in software like reverse engineering attack. That is, the paper describes the implementation of a code obfuscator, a tool which converts a Visual C++ source program into an equivalent one that is much harder to understand. We have used ANTLR parser generator for handling Visual C++ sources, and implemented some obfuscating transformations such as 'Remove comments', 'Scramble identifiers', 'Split variables', 'Fold array', 'Insert class', 'Extend loop condition', 'Add redundant operands', and 'Insert dead code'. We have also evaluated the performance and effectiveness of the obfuscator in terms of potency, resilience, and cost. When the obfuscated source code has been compared with the original source code, it has enough effectiveness for software protection though it incurs some run-time overheads.

A Study on the Secure Database Controlled Under Cloud Environment (클라우드 환경하에서의 안전한 데이터베이스 구축에 관한 연구)

  • Kim, SungYong;Kim, Ji-Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1259-1266
    • /
    • 2013
  • Nowadays, the databases are getting larger and larger. As the company has difficulty in managing the database, they want to outsource the database to the cloud system. In this case the database security is more important because their database is managed by the cloud service provider. Among database security techniques, the encryption method is a well-certified and established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data, and on the approach for searching, and the retrieval efficiency that is implemented. In this paper we propose the new suitable mechanism to encrypt the database and lookup process on the encrypted database under control of the cloud service provider. This database encryption algorithm uses the bloom filter with the variable keyword based index. Finally, we demonstrate that the proposed algorithm should be useful for database encryption related research and application activities.

Offline Based Ransomware Detection and Analysis Method using Dynamic API Calls Flow Graph (다이나믹 API 호출 흐름 그래프를 이용한 오프라인 기반 랜섬웨어 탐지 및 분석 기술 개발)

  • Kang, Ho-Seok;Kim, Sung-Ryul
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.363-370
    • /
    • 2018
  • Ransomware detection has become a hot topic in computer security for protecting digital contents. Unfortunately, current signature-based and static detection models are often easily evadable by compress, and encryption. For overcoming the lack of these detection approach, we have proposed the dynamic ransomware detection system using data mining techniques such as RF, SVM, SL and NB algorithms. We monitor the actual behaviors of software to generate API calls flow graphs. Thereafter, data normalization and feature selection were applied to select informative features. We improved this analysis process. Finally, the data mining algorithms were used for building the detection model for judging whether the software is benign software or ransomware. We conduct our experiment using more suitable real ransomware samples. and it's results show that our proposed system can be more effective to improve the performance for ransomware detection.

Digital Imaging Source Identification Using Sensor Pattern Noises (센서 패턴 잡음을 이용한 디지털 영상 획득 장치 판별)

  • Oh, Tae-Woo;Hyun, Dai-Kyung;Kim, Ki-Bom;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.12
    • /
    • pp.561-570
    • /
    • 2015
  • With the advance of IT technology, contents from digital multimedia devices and softwares are widely used and distributed. However, novice uses them for illegal purpose and hence there are needs for protecting contents and blocking illegal usage through multimedia forensics. In this paper, we present a forensic technique for identifying digital imaging source using sensor pattern noise. First, the way to acquire the sensor pattern noise which comes from the imperfection of photon detector against light is presented. Then, the way to identify the similarity of digital imaging sources is explained after estimating the sensor pattern noises from the reference images and the unknown image. For the performance analysis of the proposed technique, 10 devices including DSLR camera, compact camera, smartphone and camcorder are tested and quantitatively analyzed. Based on the results, the proposed technique can achieve the 99.6% identification accuracy.