• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.035 seconds

Development of Servo for Small Tracking Radars (소형 추적 레이다용 서보 개발)

  • Lee, Jong-Kuk;Lee, Seok-In;Kim, Jun-Su;Song, Tae-Seong;Eom, Young-Cheol;Ahn, Se-Hwan;Shin, Yu-Jin;Joo, Ji-han;Kwon, Jun-Beom;Kim, Sang-Wook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.21-30
    • /
    • 2022
  • This paper describes the design, manufacture, and testing of servos applicable to small tracking radars. First, Chapter 1 describes the necessity of this study. Chapter 2 describes the development of servos applicable to future tracking radars in small missile systems. Chapter 3 describes the design and test results for current control of brushed DC motors, brushless DC motors, and permanent magnet synchronous motors. And Chapter 4 describes the design and test results for speed control of the test wheel. And in Chapter 5, the results of the previous tests are summarized. In this paper, some pictures were intentionally blurred for security reasons, and the control result of test wheel was described, not the test with the developed gimbals.

A Watermarking Scheme Based on k-means++ for Design Drawings (k-means++ 기반의 설계도면 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.57-70
    • /
    • 2009
  • A CAD design drawing based on vector data that is very important art work in industrial fields has been considered to content that the copyright protection is urgently needed. This paper presents a watermarking scheme based on k-means++ for CAD design drawing. One CAD design drawing consists of several layers and each layer consists of various geometric objects such as LINE, POLYLINE, CIRCLE, ARC, 3DFACE and POLYGON. POLYLINE with LINE, 3DFACE and ARC that are fundamental objects make up the majority in CAD design drawing. Therefore, the proposed scheme selects the target object with high distribution among POLYLINE, 3DFACE and ARC objects in CAD design drawing and then selects layers that include the most target object. Then we cluster the target objects in the selected layers by using k-means++ and embed the watermark into the geometric distribution of each group. The geometric distribution is the normalized length distribution in POLYLINE object, the normalized area distribution in 3DFACE object and the angle distribution in ARC object. Experimental results verified that the proposed scheme has the robustness against file format converting, layer attack as well as various geometric editing provided in CAD editing tools.

A Study on the Current Status and Qualitative Development of AI Midjourney 2d Graphic Results (AI미드저니 2d그래픽 결과물의 현황과 질적 적용에 관한 연구)

  • Cho, Hyun Kyung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.803-808
    • /
    • 2024
  • As a service that creates graphic work images with AI, DALL-E2, Midjourney, Stable Diffusion, BING image generator, and Playground AI are widely used. It is that graphic also enables learner-led customized education. With this, it is worth studying detailed design customized learning materials and methods for designing efficient design in future 2D graphic work, and it is necessary to explore the areas of application. The current situation is that it is necessary to develop a design education system that can indicate the lack of AI technology through text security and questions. In this study, a successful proposal for a process that is produced through a process of creating AI design work through proxy work can be presented as a conclusion. Design, advertisement, and visual content companies are already using and adapting, and the trend is to reflect the AI graphic utilization ability and results in the portfolio along with interviews when hiring new employees. In line with this, detailed consideration and research on visual and design production methods for AI convergence between instructors and learners are currently needed. In this paper, proposals and methods for image quality production were considered in the main body and conclusions, and conclusive directions were proposed for five alternatives and methods for future applications.

A Study on the Behavior of an Existing Tunnel and the Safety Implications on its Facilities from a New Tunnel Blasting (신설 터널 발파 시 기존 터널 거동 및 시설물 안전에 관한 연구)

  • Kim, Sung Hoon;Cho, Woncheol
    • Journal of Korean Society of societal Security
    • /
    • v.3 no.2
    • /
    • pp.57-64
    • /
    • 2010
  • In this study, the behavior and safety of an existing tunnel and its facilities are investigated when a new tunnel adjacent to the existing tunnel is blasted. The design of the new tunnel puts priority on stability of the tunnel itself over the safety of the facilities which are installed within the existing tunnel such as jet fans. And thus, a detailed consideration on securing the safety of the existing facilities has been insufficient. An analysis on the types of traffic accidents in the last ten years shows that most incidents were due to the driver's improper response in emergency situations and unexpected obstacles. In consideration of this analysis, the safety of the facilities in the existing tunnel was secured by minimizing the charging amount for each hangfire and changing the excavation method of evacuation communication shelters to the large center hole cut blasting method to reduce blasting vibration. For a more quantitative analysis, measurement devices were installed inside the existing tunnel, at houses adjacent to the new tunnel, near jet fans in the existing tunnel. This enabled real time measurement of displacements of the existing tunnel, adjacent houses, and jet fans without interrupting traffic flow. Therefore, the improvements of charging amount for each hangfire, the blasting method, and the measurement method are suggested in this paper to secure the safety of the facilities in the existing tunnel when a new tunnel, located on a large city and adjacent to an existing tunnel, is designed.

  • PDF

Evaluation of Complexation Suitability of Leisure Facilities for the Elderly in Elementary School - Focused on the Current Condition of Facilities of Elementary School - (초등학교시설의 노인여가복지시설 복합화 적합성 평가 - 초등학교 시설현황을 중심으로 -)

  • Lim, Do-Young;Song, Byung-Joon;Chu, Beom
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.6
    • /
    • pp.202-211
    • /
    • 2015
  • This study attempts to deduce the necessity and validity of complexation, and suggests complexation through complexation suitability evaluations as follows. First, the concept and current state of leisure facilities for the elderly and elementary facilities and architectural complexation were investigated through theoretical considerations. Second, the target schools for complexation of 'elementary school-leisure facility for the elderly' were selected. The aspects of facility introduction of an elementary school, teacher support facility, convenience facility for the disabled, safety and security facilities as well as school facility accessibility were investigated on the basis of the data attained from theoretical considerations. Third, the feasibility of complexation of leisure facilities for the elderly was reviewed, based on the investigated data on complexation-targeted elementary school. Regarding school building and support facilities, with a focus on leisure programs for the elderly, the availability and number of rooms, extra numbers of regular classrooms and the room condition were assessed on the basis of the analysis of operational perspective of each facility. The convenience facilities for the disabled were examined by classifying them into interventional facility in consideration of facilities for the elderly, pursuant to the provisions in the convenience promotion assurance act for the disabled, elderly and pregnant women. Safety and security facilities were evaluated in an effort to assess the safety issue of the elderly and children. The result of the evaluation of the 6 elementary schools in Seong-buk county based on the above-mentioned four measurement standards shows that they scored 107~124 points out of the total 155 points, with the average of 118.5 points. This is more than the medium score and shows the possible complexation of the elementary school facilities as the leisure facilities for the elderly, and at the same time it may lead each school to find out the elements conducive to enhancing the complexation as a result of the evaluation. Through the evaluation data, I expect that we contribute to promoting the process of the evaluation of the appropriateness of complexation and the efficient complexation.

The Actual Condition investigation of Residental Environment of Urban Life-Type Housing Regarding Crime Prevention Through Environmental Design -Focused on Five Single Households in studio-type housings in Gwanak-gu, Seoul Urban Life-Type Housing- (도시형생활주택의 범죄예방환경설계 측면에서 본 주거환경 실태조사에 관한 연구 - 서울시 관악구 원룸형 주택 1인가구 5개를 중심으로-)

  • Jung, Yoon-Hye;Lee, You-Mi;Lee, Youn-Jae
    • KIEAE Journal
    • /
    • v.16 no.6
    • /
    • pp.39-50
    • /
    • 2016
  • Purpose: The purpose of this study is to be performed with studio-type housings among urban life-type housings to investigate the physical characteristic and crime-related factors of studios from the viewpoint of the basic principles of crime prevention through environmental design (CPTED). Method: Eight CPTED guidelines available in Korea were reviewed to select 20 planing factors for actual condition investigation. Five single households in studio-type housings in Gwanak-gu, Seoul, were chosen according to the subject screening criteria to perform the actual condition investigation. Results: First, a lighting plan around a building for natural surveillance should consider the building location, relation with the front road, and surrounding facilities. In a building of a piloti structure, the parking lot and the building gate should be arranged in a manner that enables natural surveillance. Second, the shape of the corridors in studio-type housings should be considered to plan the installation of a lighting at the door of each household, the installation of a viewer window at the door of each household, and the arrangement of the elevator. Third, to support access control, an access control system having the function of video and voice communication is recommended to be installed at the building gate. Criteria for the type of security windows and the floors on which security windows should be installed, and the regulations about the CCTV installation inside and outside the building should be prepared. Fourth, to enhance territoriality in parking lots, ground patterns, parking lot gate, and signs may be installed. Fifth, in view of effective utilization and maintenance, lighting facilities should be installed to increase the usability of ground parking lots, and relevant installation criteria should be prepared regarding the type, number, and brightness of the lightings.

A Study on the educational program model for the citizens on patrol (시민자율방범 교육프로그램 개발에 관한 연구)

  • Kang, Yong-Gil
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.63-93
    • /
    • 2014
  • The importance of citizen as a key of community safety has increased, and the legislation to support the citizen's activities is continued. However systematic and detailed action plans are not enough to something. Thus, the purpose of this research is to develop the educational program model for the citizens on patrol for the improvement of practical use. The methods of this research are to make and suggest the educational program for citizens on patrol by literature review and cases analysis of educational program implemented one years ago. The findings are suggested as belows. First, the learners need the contents can be practically used in the field and sufficient time of education. Second, the subgoal to achieve the ultimate goal of education program model should be established as 'customer-centered, field-oriented, competence reinforcement', and driving strategy must be composed of four stages as plan-design-implementation-evaluation. Also, for strategy of each stage, detailed sub-strategies from preparation to execution of education have to be considered. Third, education program must be categorized by basic-intermediate-expert courses depending on the level of learners, and theoretically and practically oriented curriculum subjects are organized in balance by each course.

  • PDF

A Method for developing the User Interface of a Smart-TV App based on a Smart-phone (스마트TV의 사용자 경험 향상을 위한 스마트폰 기반의 사용자 인터페이스 개발 방법론)

  • Ko, Kwang-Il
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.67-74
    • /
    • 2011
  • One of the major requisites for the success of the smart-TV is to create a circumstance where smart-TV app's are produced and purchased on a large scale. However, the smart TV app's may succeed only under the condition that the user interface of the smart TV is greatly evolved from the typical TV remote controller. Several equipments have been devised to tackle the problem of the poor user interface of the smart-TV; however, they are not satisfactory in the aspects that they usually increase the costs of TV-set and they do not help practically the app developers. The equipments are pre formed so that it is hard for the app developers to design their own user interface using them. In the paper, sMartUX, a method for developing the smart-TV app is introduced. sMartUX provides a new paradigm and development environment for designing, implementing, and operating the user interface of the smart TV app using a smart-phone. With sMartUX, app developers can design their own user interface using the various facilities of a smart-phone, and they need not to care the details of various smart-phones and how to launch their user interface onto a smart-phone.

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

The extension of the IDEA Methodology for a multilevel secure schema design (다단계 보안 스키마 설계를 위한 IDEA 방법론의 확장)

  • Kim, Jung-Jong;Park, Woon-Jae;Sim, Gab-Sig
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.879-890
    • /
    • 2000
  • Designing a multilevel database application is a complex process, and the entities and their associated security levels must be represented using an appropriate model unambiguously. It is also important to capture the semantics of a multilevel databse application as accurate and complete as possible. Owing to the focus of the IDEA Methodology for designing the non-secure database applications on the data-intensive systems, the Object Model describes the static structure of the objects in an application and their relationships. That is, the Object Model in the IDEA Methodology is an extended Entity-Relationship model giving a static description of objects. The IDEA Methodology has not been developed the multilevel secure database applications, but by using an existing methodology we could take advantage of the various techniques that have already been developed for that methodology. That is, this way is easier to design the multilevel secure schema than to develop a new model from scratch. This paper adds the security features 새? Object Model in the IDEA Methodology, and presents the transformation from this model to a multilevel secure object oriented schema. This schema will be the preliminary work which can be the general scheme for the automatic mapping to the various commercial multilevel secure database management system such as Informix-Online/Secure, Trusted ORACLE, and Sybase Secure SQL Server.

  • PDF