• Title/Summary/Keyword: Research Field Code

Search Result 336, Processing Time 0.023 seconds

A Study on Color Code Control Connected with Sound Source and Sensitivity of PA Speaker facility attachable LED Patch (PA스피커 시설물 부착형 LED패치의 음원감성 연계형 컬러코드 제어에 관한 연구)

  • Kim, Youngmin;Shin, Jaekwon;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.22-25
    • /
    • 2015
  • This paper performs Color Code Control Connected with Sound Source and Sensitivity of PA Speaker facility attachable LED patch. PA speaker delivers the technology to control the color code of LED patch along the present PA speakers for the facility-attached, LED the development of the patch. PA speakers facility attachable color code control technology of LED patch detects the sound from the PA speaker using a check, and if the analog signal source is detected (sound source)by converting the digital signal passes to the main controller can control the color and pattern of LED patches. In this paper, based on the PA speakers LED color control system, sound emotional linkage-type, and follow the lead of the PA speakers through the feelings can effectively channel LED linked to the source type and proceed to experiment with color and emotion control, whether or not they offer via the color control technology LED patch availability. PA speaker facility attachble color code control technology of LED patch connected with the source and future research directions in the field, and as the application is expected to be able to be widely utilized.

Smartphone Color-Code based Gate Security Control

  • Han, Sukyoung;Lee, Minwoo;Mariappan, Vinayagam;Lee, Junghoon;Lee, Seungyoun;Lee, Juyoung;Kim, Jintae;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.66-71
    • /
    • 2016
  • Smart building gate security control system using smartphone integrated with near field communication (NFC) has become part of daily life usage these days. The technology change in replacing RF NFC device using visible light communication technology based approach growing faster in recent days. This paper propose a design and development of gate security control system using color code based user authentication ID generation as part of an intelligent access control system to control automatic door open and close. In this approach gate security access control use the recent visible light communication technology trends to transfer the user specific authentication code to door access control system using color code on smartphone screen. Using a camera in the door access control system (ACS), color codes on smartphone screens are detected and matched to the database of authenticated user to open the door automatically in gate security system. We measure the visual light communication technology efficiency as a part of the research and the experiments have revealed that more than 95% users authenticated correctly at the suggested experiment environment on gate security control system.

The Next Generation Malware Information Collection Architecture for Cybercrime Investigation

  • Cho, Ho-Mook;Bae, Chang-Su;Jang, Jaehoon;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.123-129
    • /
    • 2020
  • Recently, cybercrime has become increasingly difficult to track by applying new technologies such as virtualization technology and distribution tracking avoidance. etc. Therefore, there is a limit to the technology of tracking distributors based on malicious code information through static and dynamic analysis methods. In addition, in the field of cyber investigation, it is more important to track down malicious code distributors than to analyze malicious codes themselves. Accordingly, in this paper, we propose a next-generation malicious code information collection architecture to efficiently track down malicious code distributors by converging traditional analysis methods and recent information collection methods such as OSINT and Intelligence. The architecture we propose in this paper is based on the differences between the existing malicious code analysis system and the investigation point's analysis system, which relates the necessary elemental technologies from the perspective of cybercrime. Thus, the proposed architecture could be a key approach to tracking distributors in cyber criminal investigations.

SEINA: A two-dimensional steam explosion integrated analysis code

  • Wu, Liangpeng;Sun, Ruiyu;Chen, Ronghua;Tian, Wenxi;Qiu, Suizheng;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3909-3918
    • /
    • 2022
  • In the event of a severe accident, the reactor core may melt due to insufficient cooling. the high-temperature core melt will have a strong interaction (FCI) with the coolant, which may lead to steam explosion. Steam explosion would pose a serious threat to the safety of the reactors. Therefore, the study of steam explosion is of great significance to the assessment of severe accidents in nuclear reactors. This research focuses on the development of a two-dimensional steam explosion integrated analysis code called SEINA. Based on the semi-implicit Euler scheme, the three-phase field was considered in this code. Besides, the influence of evaporation drag of melt and the influence of solidified shell during the process of melt droplet fragmentation were also considered. The code was simulated and validated by FARO L-14 and KROTOS KS-2 experiments. The calculation results of SEINA code are in good agreement with the experimental results, and the results show that if the effects of evaporation drag and melt solidification shell are considered, the FCI process can be described more accurately. Therefore, it is proved that SEINA has the potential to be a powerful and effective tool for the analysis of steam explosions in nuclear reactors.

Setting the scene: CFD and symposium overview

  • Murakami, Shuzo
    • Wind and Structures
    • /
    • v.5 no.2_3_4
    • /
    • pp.83-88
    • /
    • 2002
  • The present situation of CWE(Computational Wind Engineering) and the papers presented to the CWE 2000 Symposium are reviewed from the following viewpoints; 1) topics treated, 2) utilization of commercial code (software), 3) incompleteness of CWE, 4) remaining research subjects, 5) prediction accuracy, 6) new fields of CWE application, etc. Firstly, new tendencies within CWE applications are indicated. Next, the over-attention being given to the application field and the lack of attention to fundamental problems, including prediction error analysis, are pointed out. Lastly, the future trends of CFD (Computational Fluid Dynamics) applications to wind engineering design are discussed.

Development of an automobile antenna printed on-glass for FM radio reception (차량용 FM 라디오 수신을 위한 '유리창에 프린트된 안테나'의 개발)

  • 심재륜;이준호;이성신;김효태
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.35D no.5
    • /
    • pp.18-23
    • /
    • 1998
  • Development of an automobile antenna printed on-glass for FM radio receptions was discussed in this study. NEC-2 code was used as the design tool in this research. An omnidirectional radiation pattern and reception power level of the newly designed antenna were compared with those of the conventional pole antenna for the evaluation of its performance. The test sites for the reception power level measurement were chosen by their signal enbironmental condition, such as multipath fading, and strong field effect area.

  • PDF

A Study on the Establishment of Landscape Formation Plan to Rural Village - Focus on Yu-Sang Region Yeongchon City- (농촌마을 경관형성계획 수립에 관한 연구 - 영천 유상권역을 중심으로 -)

  • Yun, Ju-Cheul;Jang, Byoung-Kwan
    • Journal of Korean Society of Rural Planning
    • /
    • v.21 no.2
    • /
    • pp.177-188
    • /
    • 2015
  • This research was establishment of landscape formation plan to Yusang village region Yeongcheon city. Literature research, field research, surveys carried out for this purpose. In addition, by utilizing design code that appears in the common characteristics of the rural scenic views of the region in improving the quality of life of the local population and preserve the indigenous landscape as well as improve the quality of rural landscapes, management, capital town of the region to form Yeongcheon the center was established in the landscape plan form. The natural environment of the capital region for the landscape formation plan, Humanities and Social Environment, Landscape Resources Status, Social Consciousness, landscape map, landscape design, code identification and basic design and planning through the basic steps to derive design guidelines were applied to the landscape formation plan. Formation landscape plan for the regional launch of the regional landscape improvements, region entrance space and yusang reservoirs place, rest zone in the sacred tree and nurse trees around the plan, and repair the town hall. residents living village road maintenance to improve the environment, and develop a detailed plan, such as the lungs maintenance. The plan is likely to be able to contribute to improving the quality of life of the people and landscapes to improve regional, creating a guide for future business landscape is formed to have a significant advantage as a basis.

Assessment of Post-LOCA Radiation Fields in Service Building Areas for Wolsong 2, 3, and 4 Nuclear Power Plants (월성 원자력 발전소 2,3,4호기에서의 LOCA 사고후 보조건물의 방사선장 평가)

  • Jin, Yung-Kwon;Kim, Yong-Il
    • Journal of Radiation Protection and Research
    • /
    • v.20 no.1
    • /
    • pp.53-64
    • /
    • 1995
  • The radiation fields following the large loss of coolant accident (LOCA) have been assessed for the vital areas in the service building of Wolsong 2, 3, and 4 nuclear power plants. The ORIGEN2 code was used in calculating the fission product inventories in the fuel. The source terms were based upon the activity released following the dual failure accident scenario, i.e., a LOCA followed by impaired emergency core cooling (ECC). Configurations of the reactor building, the service building, and the ECC system were constructed for the QAD-CG calculations. The dose rates and the time-integrated doses were calculated for the time period of upto 90 days after the accident. The results showed that the radiation fields in the vital access areas were found to be sufficiently low. Some areas however showed relatively high radiation fields that may require limited access.

  • PDF

Charge Transport Characteristics of a-Se based X-ray Detector (비정질 셀레늄 기반의 X선 검출 센서의 전하 수송 특성)

  • Kang, Sang-Sik;Cha, Byung-Youl;Jang, Gi-Won;Kim, Jae-Hyung;Nam, Sang-Hee
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.375-378
    • /
    • 2002
  • There has recently been a great deal of interest in amorphous selenium for application of digital x-ray image sensor. The initial number of the electron-hole induced by interaction a-Se with x-ray photons and the collection efficiency to surface of generated charges are important parameters for x-ray sensitivity of the a-Se. Therefore, in this paper, we analyzed that thickness of a-Se film and electric field is affected on the initial number of electron-hole and the collection efficiency. The experimental value of x-ray induced charge about the various thickness and the electric field is compared with estimated absorbed energy through MCNP 4C code to analyze the mechanism x-ray induced signal of a-Se. The experimental results showed that the electric field depends on initial escape coefficient and the thickness depends on collection coefficient than escape efficient.

  • PDF

Adversarial Attacks and Defense Strategy in Deep Learning

  • Sarala D.V;Thippeswamy Gangappa
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.127-132
    • /
    • 2024
  • With the rapid evolution of the Internet, the application of artificial intelligence fields is more and more extensive, and the era of AI has come. At the same time, adversarial attacks in the AI field are also frequent. Therefore, the research into adversarial attack security is extremely urgent. An increasing number of researchers are working in this field. We provide a comprehensive review of the theories and methods that enable researchers to enter the field of adversarial attack. This article is according to the "Why? → What? → How?" research line for elaboration. Firstly, we explain the significance of adversarial attack. Then, we introduce the concepts, types, and hazards of adversarial attack. Finally, we review the typical attack algorithms and defense techniques in each application area. Facing the increasingly complex neural network model, this paper focuses on the fields of image, text, and malicious code and focuses on the adversarial attack classifications and methods of these three data types, so that researchers can quickly find their own type of study. At the end of this review, we also raised some discussions and open issues and compared them with other similar reviews.