• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.032 seconds

A Suggestions for Building Regulation through the Analysis of Problems among the Building Evacuation Laws (건축물 피난규정간 문제점 분석을 통한 법령 개선방향 설정에 관한 연구)

  • Hwang, Eun-Kyoung;Kim, Dae-Hee;Cho, Jeong-Hoon;Hwang, Keum-Sook
    • Fire Science and Engineering
    • /
    • v.21 no.4
    • /
    • pp.105-114
    • /
    • 2007
  • Recently the consideration for occupants' security has been raised as very important design element from the fire by building's large sized, higher storied, and its compounded. But the domestic Laws regulated the predicative laws according to the technical standard which has no difference from the past domestic evacuation regulations. Therefore when big fire occurs, it is not enough to guarantee for occupants to escape safely. Specially since domestic escape relevant laws are divided into Architect relevant law and fire fighting relevant law, it has caused to bring various problems. So This study will show the problems of the evacuation regulation which is registrated in the Architect relevant law and fire fighting relevant law. And also later, when Architect escape relevant laws re-registrate, this study will be used as foundational materials.

Design of Constellation Content for Children Applied to Car Glass Roof (승용차 글라스루프를 활용한 어린이용 별자리 콘텐츠 디자인)

  • Choe, Jong-Hoon;Jung, Su-Young;Choi, Yu-Mi;Kwon, Min-Jeong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.7
    • /
    • pp.141-149
    • /
    • 2013
  • Recently, the time in which children moves by car become frequent, they stay longer in the car because leisure life including camping and etc. increased. Children whose physical activities are active were subject to restriction because of the limited car boarding visual space and on security. Because of limited space in cars, domestic and foreign automotive companies show the different glass roof applied in cars that exhibited wide clear view in order to remove tedious and stuffy of children while they stay for a long time inside the car. In addition, the potential probability in which the Smart Car that the IT technology is grafted research and research that it utilizes the door window glass as the display is progressed and which the glass roof can be used as the screen can be sufficient. In this study, the in-vehicle display application case and Smart Devices constellation application were benchmarked. The car glass roof application method of the constellation studying content which performed the user survey for the child by the car with the parents whose movement is frequent and considers the child and fundamental interaction way tried to be drawn and we try to propose.

Design of Data Exchange Technique for Power Facilities Monitoring using Augmented Reality (증강현실을 이용한 전력 설비 모니터링 시스템의 데이터 교환 기법 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.16-22
    • /
    • 2020
  • Since it is difficult for individual power producers and non-professionals who lack basic knowledge to control, manage, and operate facilities through EMS (Energy Management System), augmented reality and virtual reality monitoring systems are applied. However, in the existing systems, data access efficiency is inferior due to the process of analyzing column values for analog signal values collected from sensors and converting data after combining the columns. In addition, high-speed operation processing is difficult due to a large number of indexes for accommodating access patterns for various analog signal waveforms. Therefore, in this paper, a bitmap generator is inserted into a non-tree structure to convert the data collected from power facilities into physical property information, and the converted information is encrypted with a common key, so that the resources for the resources shared between each device are We propose a method of exchanging data for an augmented reality-based power system that is controlled by measurement.

Web Resources Based Collection Development for Digital Libraries (디지털 도서관의 웹자원 기반 장서개발)

  • Lee, Jee-Yeon;Kim, Sung-Un
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.111-127
    • /
    • 2003
  • Web-based information resources should be managed and used methodically in the same manner as the paper-based resources are managed and used. It is necessitated by the prevalence of web-based delivery of a variety of information. To develop a web-based digital collection, it is critical to establish a set of standardized evaluation criteria for web-resources. The evaluation criteria needs to include authority, trustworthy, reliability, functionality, relatedness, accessibility, structure, design, user support, and security related matters. However, it is also necessary to have certain flexibility to either emphasize or include particular evaluation criteria to reflect varying characteristics of the web resources especially for the purpose of developing an effective digital collection. In addition, it is essential to review the evaluation criteria with respect to value, demand, duplication prevention, and intellectual property, which are relevant to the web-based digital collection development. Finally, various strategies were suggested as means to develop more effective web-based digital resource collection. These strategies include organizing a selection committee to ensure the objectivity and consistency in web-resource evaluation; developing a model for web-based digital resource collection; sharing new standards, protocols, markups, and metadata with other digital libraries; and developing user-centered digital resource collection.

A New Method to Estimate the Magnetic Field Modulation Effect of Brushless Doubly-Fed Machine with Cage Rotor

  • Liu, Hanghang;Han, Li;Gao, Qiang
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.1 no.3
    • /
    • pp.330-335
    • /
    • 2012
  • Brushless doubly-fed machine (BDFM) doesn't use brush and slip ring, and has advantages such as high system reliability, small capacity of its frequency converter, low system cost, adjustable power factor and speed, etc. At the same time, it has good applicable potentials on the variable frequency motors and the variable speed constant frequency generators. However, due to the complicacy and particularity of BDFM in the structure and operating mechanism, the effect of magnetic field modulation directly influences the operating efficiency of BDFM. To study the effect of different cage rotor structures on the magnetic field modulation of BDFM, the rotor magnetomotive force (MMF) of BDFM with cage rotor is studied by the analytical method. The components and features of rotor harmonic MMFs are discussed. At the same time, the method to weaken the higher harmonics is analyzed by the theoretic formulae. Furthermore, the magnetic field modulation mechanism is expounded on in detail and the relationship between the magnetic field modulation effect and the operating efficiency of BDFM is established. And then, a new method for estimating the magnetic field modulation effect is proposed. At last, the magnetic field modulation effects of four BDFM prototypes with different cage rotor structures are compared by the MMF analysis and the efficiency data of electromagnetic design. The results verify the effectiveness of the new method for estimating the magnetic field modulation effect of BDFM with cage rotor.

Design of Upper Body Detection System Using RBFNN Based on HOG Algorithm (HOG기반 RBFNN을 이용한 상반신 검출 시스템의 설계)

  • Kim, Sun-Hwan;Oh, Sung-Kwun;Kim, Jin-Yul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.4
    • /
    • pp.259-266
    • /
    • 2016
  • Recently, CCTV cameras are emplaced actively to reinforce security and intelligent surveillance systems have been under development for detecting and monitoring of the objects in the video. In this study, we propose a method for detection of upper body in intelligent surveillance system using FCM-based RBFNN classifier realized with the aid of HOG features. Firstly, HOG features that have been originally proposed to detect the pedestrian are adopted to train the unique gradient features about upper body. However, HOG features typically exhibit a very high dimension of which is proportional to the size of the input image, it is necessary to reduce the dimension of inputs of the RBFNN classifier. Thus the well-known PCA algorithm is applied prior to the RBFNN classification step. In the computer simulation experiments, the RBFNN classifier was trained using pre-classified upper body images and non-person images and then the performance of the proposed classifier for upper body detection is evaluated by using test images and video sequences.

The design of coffer dam utilized P.R.D. method (P.R.D. 공법을 활용한 가물막이 설계)

  • Park, Chal-Sook;Lee, Kyu-Tak;Yum, Kyung-Taek;Kim, Yoon-Ku;Kang, Bong-Gwon;Lee, Jae-Weon;Lim, Seok-San;Jeong, Ji-Yearl
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.10a
    • /
    • pp.869-887
    • /
    • 2008
  • Coffer dam for tunnel type spillway in inflow section of Dae-am dam was originally planned as 2 lines sheet piles with Water Zet method. But, the result of pilot test was caused of some problems that vibration during installation of pile could pollute water and water leakage could the lower part. So, sheet piles was not satisfactory for faculty of coffer dam. Structural instability of sheet pile system need to reinforcement. Characteristic of Dae-am dam was small reservoir capacity but wide drainage area, of which it was judgment that security of leakage and stability was difficult during excavation of inlet part. So, we consider that water curtain method utilized with in site pouring concrete pile method was designed at weir part of spillway. We were known about basement rock that geological boring was carried out in weir part. After taking a deep consideration, PRD method was accepted as a new method. Concrete pile by PRD was installed to below country rock. CJM method was carried out with PRD. After making concrete wall using Top-down method, earth anchors were installed for supporting it. According to the result of numerical analysis, as water level rises, wall is stable.

  • PDF

Automatic Door System Performance Improvement Study by the disturbance compensation (외란보상을 통한 자동문 시스템 성능 개선연구)

  • Park, Won-Hyeon;Kim, Min;Jeong, Jae-Hoon;Lee, Dong Heon;Choi, Myoung Hoon;Lim, Jae Jun;Byun, Gi-Sik;Kim, Gwan-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.734-736
    • /
    • 2016
  • Doors are in various buildings, such as large retail stores, hospitals, restaurants, government offices and is used as a door to provide convenience for customers, the convenience of security to control doors and exterior access Castle, etc. In the case of housing door facilities It has been used widely. However, the conventional automatic door controller Although the primary use of the PID control, the contact size and weight depending on the location to cause an instability in the system controller or the like, and disturbance of parameter variation and uncertain dynamics because of the wide variations. In this paper, we design a robust controller to compensate for uncertainties and to compensate for the disturbance.

  • PDF

Algorithm Design and Implementation for Safe Left Turn at an Intersection Based on Vehicle-to-Vehicle Communications (교차로에서의 안전 좌회전을 위한 차량간 통신 기반 알고리즘 설계 및 구현)

  • Seo, Hyun-Soo;Kim, Hyo-Un;Noh, Dong-Gyu;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.165-171
    • /
    • 2013
  • WAVE(Wireless Access in Vehicular Environments) is a representative V2V communication protocol and its standards of MAC and PHY parts except for security were published. In order to control traffic flow and ensure driver's safety using V2V communication, various projects are conducting. In particular, safety application has been researched. Therefore, in this paper, we designed the safety application algorithm, which informs a driver of the dangerous status when driver tries to turn left in an intersection and we also implemented the algorithm. Proposed algorithm configures a model for a host vehicle and a vehicle coming in opposite lane and in case that there is collision hazard it provides warning message to driver by using HMI. In order to evaluate the proposed algorithm's performance, we configured the test bed using test vehicles and we tested the algorithm on proving ground with the composed test scenarios. As test results, our system showed excellent performance. If the infrastructures for V2I communications are constructed, we will optimize our system more precisely and stably.

Design and Implementation of Mobile VTS Middleware for Efficient IVEF Service (효율적인 IVEF 서비스를 위한 모바일 VTS 미들웨어 설계 및 구현)

  • Park, Namje
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.6
    • /
    • pp.466-475
    • /
    • 2014
  • The IVEF service is the draft standard designed for exchange of information on sea traffic between the vessel traffic systems and between the vessels. Standardization of this service is under way as a part of the next-generation navigation system, called e-Navigation. The International Association of Lighthouse Authorities (IALA) suggests, on its recommendation V-145, the IVEF service model and the protocol for provisioning of this service. But the detailed configuration of this service must be designed by the users. This study suggests, based on the basic service model and protocol provided in the recommendation V-145, the implementation of the J-VTS middleware which will facilitate exchange of information on sea traffic. The J-VTS middleware consists of various components for providing the IVEF service and for processing the IVEF message protocols. The vessel traffic systems and the vessels corresponding to upper-layer applications may use the IVEF service with the functions provided by the J-VTS middleware, and the services are designed to be accessed according to the security level of users.