• Title/Summary/Keyword: Secure System

Search Result 3,581, Processing Time 0.032 seconds

Study in the Development of Motion Recognition Tap-water using Ultrasonic Sensors (초음파 센서를 이용한 모션 인식 수도꼭지 개발 및 연구)

  • Kim, Dong-Hyun;Ryu, Jae-Hoo;Ju, Jong-Soo;Ahn, Jong-Pil;Kim, Jae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.309-316
    • /
    • 2022
  • Advances in technology have improved people's lives comfortably and have developed more easily, safely and simply. We usually turn on hot water to set the temperature of the water in the bathroom and gradually adjust the temperature to find the temperature we want with our skin. In this situation, I thought, "What if there is a device that can see the temperature of water with my eyes and help with the interior of the bathroom while including a safe system," and tried to create a system that values stability. For example, if a child accidentally changes the temperature of the water to high temperature while washing, he or she can get burned. And the biggest purpose is to secure better safety by adding LCDs and LEDs so that we can visually know the temperature before feeling it tactilely. As a result of the experiment, there was no error between the temperature detected by the water temperature sensor and the temperature displayed on the LCD, and no error occurred up to 27 cm in the distance measurement experiment using the ultrasonic sensor. There has been an error of about 2% since 28cm or older, but there is no significant inconvenience in using it within the category of faucets.

Properties of Mixing Proportions with Compressive Strength Level of High Flowing Self-Compacting Concrete (고유동 자기충전 콘크리트의 압축 강도수준별 배합특성)

  • Choi, Yun Wang;Jung, Jea Gwone;Jung, Woo Yong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.2A
    • /
    • pp.163-169
    • /
    • 2009
  • The research performed a test concerning the fluidity and strength of concrete manufactured by combining lime stone power, fly ash, and blast furnace slag into two and three component systems, aiming at evaluating rheological and dynamic properties of concrete by manufacturing High Flowing Self-Compacting according to the strength changes of three levels. As a result of the research, for High Flowing Self-Compacting of 30 MPa, the combination of lime stone power 20% and fly ash 30% for securing quality and strength and adjusting viscosity satisfied the required performance. For High Flowing Self-Compacting of 50 MPa, the combination of blast furnace slag 10% and fly ash 20% satisfied the fluidity and strength of the requirement performance. Also, for 70 MPa that has many power contents, the combination of blast furnace slag 20% and fly ash 10% for the increase of fluidity and the reduction of viscosity satisfied the required performance. It is judged that fly ash in all combinations can be used to secure viscosity and reduce concrete amount. In addition, it is judged that for High Flowing Self-Compacting according to the levels of compressive strength the combination of three component system including fly ash is more appropriate than the combination of two component system.

Trend and Development Direction of Restoration Technology Utilization in Ecosystem Conservation Charge Project - Focusing on Implementation Cases from 2014 to 2020 - (생태계보전부담금 반환사업의 복원기술 활용 경향과 방향 - 2014년부터 2020년까지 시행 사례를 중심으로 -)

  • Yoon, Young-Kwan;Lee, Ho-Woo;Koo, Bon-Hak
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.26 no.5
    • /
    • pp.1-18
    • /
    • 2023
  • The Ecosystem Conservation Levy (formerly known as the Ecosystem Conservation Cooperation Fund) system has been in place for 20 years, and it can be said that it has now entered the settlement stage. Based on an analysis of publicly available project implementation data from 2014 to 2020, we found that: 1) As the number of return projects increases, the targets of restoration technologies are also strengthening, and it is necessary to frame a series of processes from application, creation, and monitoring for some detailed projects to improve the effectiveness and efficiency of utilizing the levy. 2) Most of the implemented projects are applied as micro-ecosystem creation, but there are many cases where the contents of the project can be seen as other project categories. This shows that the purpose of the return project needs to be approached more clearly and suggests that institutional complementation is needed from the project application stage. 3) The detailed technologies applied tend to be gradually expanding, but most of them are technologies that are not differentiated from general development projects. It is urgent to secure a more technical identity, such as a range and list of utilized technologies suitable for the characteristics and purposes of return projects. 4) It is necessary to establish a relevant evaluation system or framework to utilize the monitoring results of restoration projects. 5) There have been few cases of application of single restoration technologies since the beginning, but the content and scope of the complexity tend to expand in recent years. Even if the objectives are not comprehensive and diverse, it can be seen that many parts of the projects are oriented toward convergence, so it is necessary to conduct separate research on this. 6) As for the direction of improvement of the return project, it is possible to consider expanding the restoration and conservation focus to partially accommodate the complexity of the natural environment and human ecology. It seems that the expansion of restoration technologies that consider the role and function of humans in the natural environment should be explored.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

A Study on How to Build a User-centered·Field-oriented Ship-communication Test Environment(Living Lab) (사용자 중심의 선박통신 현장 시험 환경(Living Lab) 구축 방안 연구)

  • Sangjin JANG;Bu-Young KIM;Hyo-Jeong KIM;Si-Hwan LEE;Taehan SONG;Woo-Seong Shim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.394-400
    • /
    • 2023
  • Unlike advancements on land, the maritime industry has been slow to embrace new technologies, primarily due to user apprehension toward unproven innovations in the development process. The existing paradigm of technology development, marked by expert-oriented and laboratory-centric test environments, often leads to a stagnation of progress at the research stage, as the applicability of the technology remains uncertain. This study departed from the conventional research system and introduced a novel methodology known as a "living lab." This approach aimed to ensure applicability by actively involving field-oriented users throughout the entire lifecycle of technology development, encompassing planning, development, verification, and evaluation. The presentation of a plan for the construction and operation of such a living lab in this study is expected to contribute to establishing an efficient experimentation system for ships that can reflect user opinions in the future and to secure technology applicability in the maritime field.

Information Security Job Skills Requirements: Text-mining to Compare Job Posting and NCS (정보보호 직무 수행을 위해 필요한 지식 및 기술: 텍스트 마이닝을 이용한 구인광고와 NCS의 비교)

  • Hyo-Jung Jun;Byeong-Jo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.179-197
    • /
    • 2023
  • As a sufficient workforce supports the industry's growth, workforce training has also been carried out as part of the industry promotion policy. However, the market still has a shortage of skilled mid-level workers. The information security disclosure requires organizations to secure personnel responsible for information security work. Still, the division between information technology work and job areas is unclear, and the pay is not high for responsibility. This paper compares job keywords in advertisements for the information security workforce for 2014, 2019, and 2022. There is no difference in the keywords describing the job duties of information security personnel in the three years, such as implementation, operation, technical support, network, and security solution. To identify the actual needs of companies, we also analyzed and compared the contents of job advertisements posted on online recruitment sites with information security sector knowledge and skills defined by the National Competence Standards used for comprehensive vocational training. It was found that technical skills such as technology development, network, and operating system are preferred in the actual workplace. In contrast, managerial skills such as the legal system and certification systems are prioritized in vocational training.

Study on Weather Modification Hybrid Rocket Experimental Design and Application (기상조절용 하이브리드 로켓의 실험 설계 및 활용연구)

  • Joo Wan Cha;Bu-Yo Kim;Miloslav Belorid;Yonghun Ro;A-Reum Ko;Sun Hee Kim;Dong-Ho Park;Ji Man Park;Hae Jung Koo;Ki-Ho Chang;Hong Hee Lee;Soojong Kim
    • Atmosphere
    • /
    • v.34 no.2
    • /
    • pp.203-216
    • /
    • 2024
  • The National Institute of Meteorological Sciences in Korea has developed the Weather Modification Hybrid Rocket (WMHR), an advanced system that offers enhanced stability and cost-effectiveness over conventional solid-fuel rockets. Designed for precise operation, the WMHR enables accurate control over the ejection altitude of pyrotechnics by modulating the quantity of oxidizer, facilitating specific cloud seeding at various atmospheric layers. Furthermore, the rate of descent for pyrotechnic devices can be adjusted by modifying parachute sizes, allowing for controlled dispersion time and concentration of seeding agents. The rocket's configuration also supports adjustments in the pyrotechnic device's capacity, permitting tailored seeding agent deployment. This innovation reflects significant technical progression and collaborations with local manufacturers, in addition to efforts to secure testing sites and address hybrid rocket production challenges. Notable outcomes of this project include the creation of a national framework for weather modification technology utilizing hybrid rockets, enhanced cloud seeding methods, and the potential for broader meteorological application of hybrid rockets beyond precipitation augmentation. An illustrative case study confirmed the WMHR's operational effectiveness, although the impact on cloud seeding was limited by unfavorable weather conditions. This experience has provided valuable insights and affirmed the system's potential for varied uses, such as weather modification and deploying high-altitude meteorological sensors. Nevertheless, the expansion of civilian weather rocket experiments in Korea faces challenges due to inadequate infrastructure and regulatory limitations, underscoring the urgent need for advancements in these areas.

Analysis and implications of North Korea's new strategic drones 'Satbyol-4', 'Satbyol-9' (북한의 신형 전략 무인기 '샛별-4형', '샛별-9형' 분석과 시사점)

  • Kang-Il Seo;Jong-Hoon Kim;Man-Hee Won;Dong-Min Lee;Jae-Hyung Bae;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.167-172
    • /
    • 2024
  • In major wars of the 21st century, drones are expanding beyond surveillance and reconnaissance to include land and air as well as sea and underwater for purposes such as precision strikes, suicide attacks, and cognitive warfare. These drones will perform multi-domain operations, and to this end, they will continue to develop by improving the level of autonomy and strengthening scalability based on the High-Low Mix concept. Recently, drones have been used as a major means in major wars around the world, and there seems to be a good chance that they will evolve into game changers in the future. North Korea has also been making significant efforts to operate reconnaissance and attack drones for a long time. North Korea has recently continued to engage in provocations using drones, and its capabilities are gradually becoming more sophisticated. In addition, with the recent emergence of new strategic Drones, wartime and peacetime threats such as North Korea's use of these to secure surveillance, reconnaissance and early warning capabilities against South Korea and new types of provocations are expected to be strengthened. Through this study, we hope to provide implications by analyzing the capabilities of North Korea's strategic Drones, predicting their operation patterns, and conducting active follow-up research on the establishment of a comprehensive strategy, such as our military's drone deployment and counter-drone system solutions.

Korea's Defense Industry Export Strategy to Enter the World's Big4 - Focusing on Securing Cutting-edge Technology and Joint Research and Development (한국 방산수출 세계 빅4 진입 전략 -첨단기술 확보와 공동연구개발을 중심으로)

  • PARK JUNG HWAN
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.227-233
    • /
    • 2024
  • Korea achieved its highest ever defense export performance in 2022. Defense exports are the most effective way to promote the defense industry by exporting Korea's weapons to foreign countries. In addition, to continuously supply excellent weapon systems, a solid defense industry must be established. So defense industry exports are an important issue at the national level, the Korea government is actively supporting policies for the Presidential office as a control tower. In particular, the topic of entry into the defense industry export big4 is being raised in Korea. As an innovative defense export promotion plan, this paper presents a strategic plan of joint research and development that export customized to the needs of purchasing countries and securing cutting-edge technology that can possess world-class weapon systems. In other words, in order to secure cutting-edge technology, the military must break away from existing methods and boldly select cutting-edge technology, provide sufficient budget support, and grant autonomy to development agencies. A rapid acquisition system must also be introduced so that this technology can be applied to advanced weapons in a timely manner. Export joint research and development is intended to promote flexible technology transfer excluding ultra-sensitive core technologies and to form strategic partnerships, taking into account the purchasing country's willingness to possess cutting-edge technology. Through this, we have helped Korea's defense industry exports enter the world's big4 through groundbreaking new strategy.

Analyzing K-POP idol popularity factors using music charts and new media data using machine learning (머신러닝을 활용한 음원 차트와 뉴미디어 데이터를 활용한 K-POP 아이돌 인기 요인 분석)

  • Jiwon Choi;Dayeon Jung;Kangkyu Choi;Taein Lim;Daehoon Kim;Jongkyn Jung;Seunmin Rho
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.55-66
    • /
    • 2024
  • The K-POP market has become influential not only in culture but also in society as a whole, including diplomacy and environmental movements. As a result, various papers have been conducted based on machine learning to identify the success factors of idols by utilizing traditional data such as music and recordings. However, there is a limitation that previous studies have not reflected the influence of new media platforms such as Instagram releases, YouTube shorts, TikTok, Twitter, etc. on the popularity of idols. Therefore, it is difficult to clarify the causal relationship of recent idol success factors because the existing studies do not consider the daily changing media trends. To solve these problems, this paper proposes a data collection system and analysis methodology for idol-related data. By developing a container-based real-time data collection automation system that reflects the specificity of idol data, we secure the stability and scalability of idol data collection and compare and analyze the clusters of successful idols through a K-Means clustering-based outlier detection model. As a result, we were able to identify commonalities among successful idols such as gender, time of success after album release, and association with new media. Through this, it is expected that we can finally plan optimal comeback promotions for each idol, album type, and comeback period to improve the chances of idol success.

  • PDF