• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.03 seconds

Diffractive Optical Element for Noise-reduced Beam Shaping of Multi-array Point Light Source

  • Lee, Jonghyun;Hahn, Joonku;Kim, Hwi
    • Current Optics and Photonics
    • /
    • v.5 no.5
    • /
    • pp.506-513
    • /
    • 2021
  • An arrayed diffractive optical element design for the beam-shaping of a multi-array light source is proposed. This is an essential device for recent optical security and face recognition applications. In practice, we devise a DC noise reduction technique featuring high fabrication error tolerance regarding the multi-array light source diffractive optical elements, as a necessary part of the proposed design method. The spherical diverging illumination leads to DC-conjugate noise spreading. The main idea is tested experimentally, and the multi-array light source diffraction pattern is investigated numerically.

Nonlinear finite element model updating with a decentralized approach

  • Ni, P.H.;Ye, X.W.
    • Smart Structures and Systems
    • /
    • v.24 no.6
    • /
    • pp.683-692
    • /
    • 2019
  • Traditional damage detection methods for nonlinear structures are often based on simplified models, such as the mass-spring-damper and shear-building models, which are insufficient for predicting the vibration responses of a real structure. Conventional global nonlinear finite element model updating methods are computationally intensive and time consuming. Thus, they cannot be applied to practical structures. A decentralized approach for identifying the nonlinear material parameters is proposed in this study. With this technique, a structure is divided into several small zones on the basis of its structural configuration. The unknown material parameters and measured vibration responses are then divided into several subsets accordingly. The structural parameters of each subset are then updated using the vibration responses of the subset with the Newton-successive-over-relaxation (SOR) method. A reinforced concrete and steel frame structure subjected to earthquake loading is used to verify the effectiveness and accuracy of the proposed method. The parameters in the material constitutive model, such as compressive strength, initial tangent stiffness and yielding stress, are identified accurately and efficiently compared with the global nonlinear model updating approach.

Organization of Independent Work of Students of Higher Pedagogical Universities of Ukraine by Means of Moodle

  • Alla, Lukіianchuk;Dmytro, Yefimov;Oksana, Biletska;Andrii, Hrytsenko;Oxana, Hevko
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.421-426
    • /
    • 2022
  • This study aimed to determine the effectiveness of the Moodle system in the organization of independent work of students of pedagogical profile.The purpose of the article is to analyze the Moodle platform as an innovative element of educational and pedagogical strategies and a component of the educational and methodological content for the self-study of students.Methodology is divided into clusters: general scientific (analysis, classification), ICT methods (modeling, informatization), and philosophical (synergetics). The study revealed the reorientation of Moodle from an auxiliary element to an alternative format in the organization of independent work of student teachers. Prospects for further scientific research determined in the interest of all participants in the educational process in the further development of Moodle as an effective tool for self-education of future teachers.

Hysteretic performance of the all-steel buckling-restrained brace with LY315 steel core

  • Wei, Xuan;Yang, Lu;Chen, Yohchia Frank;Wang, Meng
    • Steel and Composite Structures
    • /
    • v.44 no.6
    • /
    • pp.899-912
    • /
    • 2022
  • To study the seismic performance of the all-steel buckling-restrained brace (BRB) using the novel soft steel LY315 for core member, a total of three identical BRBs were designed and a series of experimental and numerical studies were conducted. First, monotonic and cyclic loading tests were carried out to obtain the mechanical properties of LY315 steel. In addition, the parameters of the Chaboche model were calibrated based on the test results and then verified using ABAQUS. Second, three BRB specimens were tested under cyclic loads to investigate the seismic performance. The failure modes of all the specimens were identified and discussed. The test results indicate that the BRBs exhibit excellent energy dissipation capacity, good ductility, and excellent low-cycle fatigue performance. Then, a finite element (FE) model was established and verified with the test results. Furthermore, a parametric study was performed to further investigate the effects of gap size, restraining ratio, slenderness ratio of the yielding segment, and material properties of the core member on the load capacity and energy dissipation capacity of BRBs.

A Study on the Development about Crisis Control Analyzes and the Realities of VIP Terrorism (요인(要人)테러의 위기관리 사례분석 및 발전방향에 관한 고찰)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.235-259
    • /
    • 2007
  • These days our society, no matter it is individual or community or nation it has diversity big and small trouble and Terrorism, disaster that gives national crisis in many different ways. Before we dont think disaster is big problem in nation crisis but now we have to think seriously and put the disaster problem in nation crisis. Also security terrorism is important in national crisis just same as security of nation and disaster in national crisis management. Specially, attacking national sovereign and the head of the government are still increasingly and if deadly terror happens than nation will get big crisis and can get aftereffect. Accordingly way of development about crisis control in security terrorism, first of all, for make confrontation system because of crisis management, need judical revision about escort law and prevention of terror. Second of all, need exclusion of guard danger element for strengthening guard safe action. Third of all, strengthening education to people so increase ability of conquest in the scene. Finally, security terror not only directly purpose also indirectly purpose increase, need to development about guards way and need a strong will to reduce terrorism, also put emphasis on prevention guards action and before the fact make perfection more perfect in crisis control to removal element of terror.

  • PDF

Dynamic Sensitivity Level Measurement for Privacy Protection (개인정보보호 강화를 위한 동적 보안수준 결정)

  • Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.1
    • /
    • pp.137-150
    • /
    • 2012
  • For social demand and technological development, systematic private information management and security guidance have been enhanced; however, the issue of leakage and invasion of private information is shown in many ways. In the management of such private information, the issue of how to protect such information is one of the sensitive key elements. As a criterion to decide the management policy of each property information consisting of private information, this article suggests Dynamic-Security-Level-Measurement for property information. DSLM adopts the variable characteristics of property information as the element of measurement. By applying this method, it is possible to provide information management functions to cope with the changes of each property information security level of an individual actively. It is expected that this will improve the security of previous information management methods even more and also contribute to the improvement of security in integrated systems such as the integrated ID management system and electronic wallet.

A Study of Software Architecture Design Methods for Multiple Access Con trol under Web-based Medical Information System Environment (웹 기반 의료정보시스템 다중 접근제어를 위한 소프트웨어아키텍쳐 설계방법)

  • Noh, Si-Choon;Hwang, Jeong-Hee
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.43-49
    • /
    • 2011
  • Web-based health information provides a lot of conveniences, however the security vulnerabilities that appear in the network environment without the risk of exposure in the use of information are growing. Web-based medical information security issues when accessing only the technology advances, without attempting to seek a safe methodology are to increase the threat element. So it is required. to take advantage of web-based information security measures as a web-based access control security mechanism-based design. This paper is based on software architecture, design, ideas and health information systems were designed based on access control security mechanism. The methodologies are to derive a new design procedure, to design architecture and algorithms that make the mechanism functio n. To accomplish this goal, web-based access control for multiple patient information architecture infrastructures is needed. For this software framework to derive features that make the mechanism was derived based on the structure. The proposed system utilizes medical information, medical information when designing an application user retrieves data in real time, while ensuring integration of encrypted information under the access control algorithms, ensuring the safety management system design.

The Effects of Security Agents' Job Stresses on Coping Strategy: Focussing on Moderating Effects of Five Personality Factors (시큐리티 요원의 직무스트레스가 대처행동에 미치는 영향 -성격5요인의 조절효과-)

  • Kim, Eui-Young;Lee, Jong-Hwan;Cho, Sung-Jin
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.69-80
    • /
    • 2016
  • The purpose of this study is to examine the effects of job stress factors on Coping Strategy' turnover intention, and to analyze the moderating effects of five personality factors between each job stress factor and turnover intention. To achieve this purpose, this study surveyed users of the Seoul and Gyeonggi in based on cluster sampling method. A total of 262 samples were used for this study, except 18 erroneous samples dropped. For the data process of the questionnaire, each answer content was coded and an element analysis, credibility analysis, frequency analysis, co-relationship analysis and regression analysis were performed using the SPSS version 18.0 of Angel for Windows. Through the data analysis following the research methods above, the conclusion was acquired as follows: First, thejob stress of the security personnel affect coping behavior. Second, in the effects of Security Agents Job Stress on Coping Strategy, Five Personality Factors showed moderating effects.

A Study of Security Policy for U-Healthcare Service (U-Healcare 서비스를 위한 보안정책에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.747-751
    • /
    • 2013
  • Researches on U-Healthcare service integrating medical information and IT technologies are actively conducted. U-Healthcare service is the next generation's medical paradigm that ensures conveniences to many users so that the society recognizes the importance and attempts for commercialization through various business model are performed. To form such U-Healthcare service market safely, various policies on the social structure should be established through the standard and the medical law to systemize of the medical information led by the governmen. Especially, the government's security policy to ensure the safety for the government leading visualization of U-Healthcare should be firmly established. Firstly, this paper presents U-healthcare Service and policy guideline. Secondly, it analyzes security threatening factors for the safe U-Healthcare service. By classifying the analyzed security threatening factors based on three major elements of the security, Confidentiality, Integrity and Availability of security policy for each element is proposed.

A Study for u-Healthcare Networking Technology Framework Approach Based on Secure Oriented Architecture(SOA) (Secure Oriented Architecture(SOA)에 기반한 u-Healthcare 네트워크 보안기술 프레임워크 모델)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.101-108
    • /
    • 2013
  • Sensor network configurations are for a specific situation or environment sensors capable of sensing, processing the collected information processors, and as a device is transmitting or receiving data. It is presently serious that sensor networks provide many benefits, but can not solve the wireless network security vulnerabilities, the risk of exposure to a variety of state information. u-Healthcare sensor networks, the smaller the sensor node power consumption, and computing power, memory, etc. restrictions imposing, wireless sensing through the kind of features that deliver value, so it ispossible that eavesdropping, denial of service, attack, routing path. In this paper, with a focus on sensing of the environment u-Healthcare system wireless security vulnerabilities factors u-Healthcare security framework to diagnose and design methods are presented. Sensor network technologies take measures for security vulnerabilities, but without the development of technology, if technology is not being utilized properly it will be an element of threat. Studies suggest that the u-Healthcare System in a variety of security risks measures user protection in the field of health information will be used as an important guide.