• Title/Summary/Keyword: Protection function

Search Result 1,150, Processing Time 0.025 seconds

A Study on the military uniforms -Based on strategical changes and innovations of military firearms- (군복에 대한 연구 -무기발달과 전술변화를 중심으로-)

  • 한순자
    • Journal of the Korean Society of Costume
    • /
    • v.32
    • /
    • pp.243-259
    • /
    • 1997
  • The object of this research is to inform readers of the chronikal change of Military Uniform in wars how the features and colors of uniforms have been changed along with the innovations of firearms. Military uniforms can be put into two differ-ent categories which are 'Battle wear' and 'Rank wear' A battle wear features of protec-tion and user fiendliness, These features of a battle wear can possibly minimize injuries and help increase the level of battling perform-ance. On the other hand a rank wear help dis-tinguish soldiers from their ranks and posi-tions. A rank wear symbolizs the pride that soldiers take n their unit and by wearing a rank wear soldiers feel more attached to their collegues and unit. Concrete process of military uniforms is as follows. 1. As firearms were innovated corres-pondant innovation of military uniforms were also needed this innovation were in the formstructure design color etc. 2. In the beginning features of military uniforms changed toward protection and then after social status of solders rised features changed forward show-off Finally as firearms became more fortal camouflage became the most significant feature of the military uniforms. 3. During war colors of military uniforms tended to be a means of show -off and camou- flage and while not in war they functioned as symbol which represent froops and the unit is tradition. 4. Other accessaries support the perforance and the symbolical function of uniforms.

  • PDF

Experimental Study on Downstream Local Scour of Free-Falling Jet (자유낙하수맥 하류부에서의 세굴에 관한 실험적 연구)

  • 윤세의;이종태
    • Water for future
    • /
    • v.28 no.4
    • /
    • pp.147-154
    • /
    • 1995
  • Scour characteristics of noncohesive bed materials at the downstream of free-falling jet were analyzed through hydraulic experiments. It was assumed that the downstream had no special energy dissipators. Flow characteristics of free falling jet from rectangular section were studied, and scour characteristics with and without mounds, which were generated at the downstream of the scour hole, were comparatively analyzed for various bed materials, discharges and tailwater depths. Not only the equilibrium scour depth but also the height of mound could be expressed as a function of densimetric Froude number. Densimetric Froude number had closer relationship with the equilibrium dimensionless scour depth than other dimensionless parameters. It was suggested that the mound effects should be considered at the design stage of bed protection works.

  • PDF

A Study on National Economic Loss and Economic Effects of Security Measures against (Voice)Phishing ((보이스)피싱의 국가경제손실과 보안효과 연구)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.157-160
    • /
    • 2012
  • (Voice)Phishing against the old or weak person used the method which is social engineering in the object and financial structure and function. Until recently (voice)Phishing from Chaina caused economic devastation and the economic loss by Phishing grows with the South Korean whole. Korean government and organizations involved have been strengthening protection system and a financial security device. But it is not easy to verify how much effects of security measures are. In this paper we will study the economic loss caused by (voice)Phishing and economic efficiency of security measures and security device reinforcement of the Republic of Korea.

  • PDF

Digital Video Contents Protection based on DRM (DRM 기반의 디지털 비디오 콘텐츠 보호)

  • Boo, Hee-Hyung;Lee, Wu-Ju;Bae, Ho-Young;Lee, Bae-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.827-830
    • /
    • 2005
  • 본 논문은 DRM(Digital Rights Management)의 핵심요소기술인 디지털 비디오 워터마킹 기술에서 암호화 기법을 함께 적용하여 저작권 판별 및 콘텐츠 보호의 두 가지 역할을 수행하는 시스템을 제안하고자 한다. 본 논문에서는 저작권 정보를 공개키 기반의 RSA 암호화 방법으로 암호문을 만든 후 이진화 과정을 수행하여 워터마크 키 정보를 생성하였고, 워터마킹 기법으로는 통계적 모델의 계산 속도가 빠른 NVF(Noise Visibility Function) 방식의 Adaptive Stationary GG(Generalized Gaussian) model[1]의 기법을 사용하였다. 암호문은 사용자 컨트롤러에서 제어가 가능하도록 하여 권한이 부여된 사용자만이 재생이 가능하도록 하였다. 본 논문의 구성은 2장에서 암호화 과정을 설명하고, 3장에서는 기존의 기법과는 다른 통계적 접근의 워터마킹 기법을 적용한 과정을 설명하며, 4장에서는 제안한 방법이 실제 환경에서의 실험 결과를 보여준다. 마지막으로 5장에서는 결론과 개선점을 바탕으로 향후 연구방향을 제시한다. 본 논문에서 제안한 방법은 미래사회 인터넷에서의 올바른 디지털 콘텐츠 사용 문화 정책에 큰 역할을 할 것으로 기대된다.

  • PDF

Study for Research Trends on Radioprotective Effects of Herbs (한약의 방사선 부작용 억제효과에 관한 경향 분석)

  • Lee, Soo-Jin
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.24 no.4
    • /
    • pp.559-565
    • /
    • 2010
  • Cancer is already a well-recognized main cause of mortality and the incidence of cancer is increasing steadily. Because conventional treatment modalities for cancer accompanies severe side effects, traditional medicine has been considered as alternatives to reduce the adverse effects and its use has continued to rise in cancer therapy. This study aims to summarize and make a reference of radioprotective effects of herbs worldwide. In this process, this review surveyed all papers of radioprotective-focused studies using herbal medicine in PubMed database and finally 44 papers were included. The type of materials, formation of experiments, type of herbal medicine, their action and mechanisms, and type of cancer were analyzed. The number of studies on radioprotective effects of herbal medicine has increased since 2000. The main formation of experiments was clinical study and the portion was 45% and the proportion of the research using prescriptions was 51% and the research using herbal products was 25%. Herbs and prescriptions having the effects of tonifying and nourishment were used the most. Most of herbal medicine in this study can enhance immune function, increase anti-oxidant effect, regulate cell cycle and increase sensitivity to radiotherapy. This study will provide the useful information on development of herbal medicine having radioprotective effects.

History of Laryngology (후두학의 역사)

  • Chung, Sung-Min
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.23 no.1
    • /
    • pp.13-17
    • /
    • 2012
  • An understanding of the history of laryngology is both interesting and useful for those in the field so this study attempts to uncover some of the interesting aspects of its history. The oldest reference of laryngology in the Orient is in the medical documents called the "Whangjainaekyung",(황제내경) which was written over a time period between 3000-4000 B.C., and described the laryngeal function of respiration, protection of the airway and phonation. In the West, a drawing that seems to portray a tracheostomy was found in medical tombs in the plains of Saqqara in Egypt. These drawings date from approximately 3600 B.C. A watershed in laryngology occurred when a spanish music professor named Manuel Garcia in first successfully used a mirror to inspect the larynx. Since that time, laryngology has developed relatively quickly and clinical laryngology made it possible by means of a number of favorable developments. Great advances in laryngological diagnosis and treatment has occurred since the 1970s thanks to improvements in technology leading to the introduction of an operating microscope, endoscopes and lasers. Despite our recent advances in laryngology, we still have not achieved uniformly favorable outcomes and there is much that we do not know. Our future promises continued advances in the field of laryngology such as gene therapy to improve wound healing and tissue engineering to allow the recreation of normal mucosa. In this review, I divide the history of the larynx into the past, present and future. In the last section, I described the history of laryngology in Korea briefly.

  • PDF

Optimal Design of High-Capacity Column-Type Load Cell Using Response Surface Method (반응표면법을 이용한 고하중 기둥형 로드셀의 치적설계)

  • 이태현;이태희;변철웅;박준구
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.754-758
    • /
    • 2002
  • According to the enlargement of production facilities and structures, the requirements of high-capacity load cells are increased for monitoring the process conditions in many fields. Generally, however, the accuracy of the column-type high-capacity load cells is not enough due to the geometric nonlinearity. It is supposed to result from the fact that the whole spring element is under high-level stress for the uniform strain field. In this paper, a new shape of spring element is developed which utilizes the stress concentration. As a design criterion, an object function which quantifies the degree of nonlinearity is defined and optimized by use of response surface modeling. As a result, the weight of the spring element is reduced shout 50% in comparison to the conventional shape. The bonding positions of stain gages are found. which show theoretically zero geometrical nonlinearity, while the ratio of overload protection is reduced from 130% to 125% Also it is shown that the response surface method is very efficient in the optimization approach by use of FEM.

  • PDF

Design and Implementation of a Low Power Chip with Robust Physical Unclonable Functions on Sensor Systems (센서 시스템에서의 고신뢰 물리적 복제방지 기능의 저전력 칩 설계 및 구현)

  • Choi, Jae-min;Kim, Kyung Ki
    • Journal of Sensor Science and Technology
    • /
    • v.27 no.1
    • /
    • pp.59-63
    • /
    • 2018
  • Among Internet of things (IoT) applications, the most demanding requirements for the widespread realization of many IoT visions are security and low power. In terms of security, IoT applications include tasks that are rarely addressed before such as secure computation, trusted sensing, and communication, privacy, and so on. These tasks ask for new and better techniques for the protection of data, software, and hardware. An integral part of hardware cryptographic primitives are secret keys and unique IDs. Physical Unclonable Functions(PUF) are a unique class of circuits that leverage the inherent variations in manufacturing process to create unique, unclonable IDs and secret keys. In this paper, we propose a low power Arbiter PUF circuit with low error rate and high reliability compared with conventional arbiter PUFs. The proposed PUF utilizes a power gating structure to save the power consumption in sleep mode, and uses a razor flip-flop to increase reliability. PUF has been designed and implemented using a FPGA and a ASIC chip (a 0.35 um technology). Experimental results show that our proposed PUF solves the metastability problem and reduce the power consumption of PUF compared to the conventional Arbiter PUF. It is expected that the proposed PUF can be used in systems required low power consumption and high reliability such as low power encryption processors and low power biomedical systems.

Robust video watermarking algorithm for H.264/AVC based on JND model

  • Zhang, Weiwei;Li, Xin;Zhang, Yuzhao;Zhang, Ru;Zheng, Lixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2741-2761
    • /
    • 2017
  • With the purpose of copyright protection for digital video, a novel H.264/AVC watermarking algorithm based on JND model is proposed. Firstly, according to the characteristics of human visual system, a new and more accurate JND model is proposed to determine watermark embedding strength by considering the luminance masking, contrast masking and spatial frequency sensitivity function. Secondly, a new embedding strategy for H.264/AVC watermarking is proposed based on an analysis on the drift error of energy distribution. We argue that more robustness can be achieved if watermarks are embedded in middle and high components of $4{\times}4$ integer DCT since these components are more stable than dc and low components when drift error occurs. Finally, according to different characteristics of middle and high components, the watermarks are embedded using different algorithms, respectively. Experimental results demonstrate that the proposed watermarking algorithm not only meets the imperceptibility and robustness requirements, but also has a high embedding capacity.

The Improved-Scheme of Two Factor Authentication using SMS (SMS를 이용하는 개선된 이중 인증 기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • Passwords are a common method of identifying and authenticating a user who wishes to log on to a secure system. Password-based authentication techniques, however, do not provide strong security and recognized as being an poor form of protection. It is not all the responsibility of the user to control password and to protect its confidentiality. In this paper, confirm an appropriate response time and I propose a new and improved method of implementing two factor authentication using SMS via receiving apparatus(mobile and email).