• Title/Summary/Keyword: Windows Systems

Search Result 560, Processing Time 0.028 seconds

Infill-system Development for Long-Life Housing with Durability & Flexibility: Focused on the Constructing and Evaluating Application of Mock-up House (내구성 및 가변성을 갖는 장수명 공동주택의 가변요소 시스템 개발 : 실험주택 건립 및 적용성 평가를 중심으로)

  • Cheong, So-Yi;Park, Joon-Young;Chun, Young-Soo
    • Land and Housing Review
    • /
    • v.2 no.4
    • /
    • pp.397-406
    • /
    • 2011
  • This research aims to develop various infill-systems for practically applying to long-life housing with 100-year durability and flexibility as a strategy for realizing sustainable residential environment. Especially, the developed infill-systems & technologies were concentrated to the mock-up house applied with the standard model of long-life housing, and their in-situ applicability by a phase, experts' consultation, and questionnaire survey were also evaluated. This research was executed to divide by 3 phases. In the First phase infill-systems for a housing unit of $84m^2$ exclusive use area as well as a support of whole structure and infill-systems including dry wall, and windows were constructed, and their in-situ applicability were evaluated. In the Second phase vertical integration of upper and lower housing units of $50m^2$ and $40m^2$ exclusive use area was investigated the first in domestic for 3 housing units of $50m^2$ exclusive use area. In addition, various infill-systems including the horizontal expansion of $50m^2$ and $10m^2$ exclusive use areas were also constructed and evaluated on their in-situ applicability. In the third phase diverse performance tests and field investigation for in-situ verifying of dry Ondol, developed this research, were executed to improve their practicability. Inner dry walls were taken apart, moved and re-constructed for verifying their practicability to investigate 3R-Reduce, Reuse and Recycle-realization too.

Balcony window style photo-voltaic(PV) system design by considering resident's residential time rate - Focus on the design of apartment building balcony window PV system and it's performance - (거주자 주택 점유율을 고려한 공동주택 발코니 PV시스템 디자인 - 공동주택의 발코니 PV시스템 디자인과 성능검증 중심으로 -)

  • Chin, Kyung-Il
    • Korean Institute of Interior Design Journal
    • /
    • v.18 no.5
    • /
    • pp.101-110
    • /
    • 2009
  • In case of general residential house, photovoltaic can be installed at roof, wall, and any other places. But, in case of apartment building, there has not enough roof space to install photovoltaic panels to supply enough electricity. Actually, apartment building roof and facade wall (exclude the balcony window space) is not enough space to produce and supply the electricity to residents by installing PV panel. Generally, the space of facade balcony with windows in facade wall at apartment building occupied about $70{\sim}80%$, in all facade space. So, if we could use the balcony and windows space in facade as PV to generating electricity, there could contribute the energy saying. But, PV cell is opacify. So if it installed at front window area in apartment building, residents may have displeasure for that opacity character. But the other hand, residents are not always in house especially in day time that is exactly good time for generating electricity by PV. If we can use PV at the facade balcony with window without collusion of resident's displeasure, there have good attraction to using sustainable energy. Hence, this study suggests the design of facade balcony window style PV by considering resident's living pattern in apartment building. The methods of this study are as follows. At first, this study surveyed to the residents about residential time in their home and asked user demand by Delphi survey. At second, this study designed balcony open style PV system which oriented to the user demand. At third, this study tests designed result performance by computer simulation that compared design result with old design. As a result, For the purpose of satisfying the resident demand, there designed sliding window style which slide the several door systems to the one side. That would be make balcony absolute open scenery to the residents. Hence, the designed system performance results were as follows. When we compare the small apartment and large apartment, smaller one has good performance than larger one. Because resident's residential time characteristic. And that has more good electronic performance than vertical style that is similar to roof style.

A Study on Image Acquisition and Usage Trace Analysis of Stick-PC (Stick-PC의 이미지 수집 및 사용흔적 분석에 대한 연구)

  • Lee, Han Hyoung;Bang, Seung Gyu;Baek, Hyun Woo;Jeong, Doo Won;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.307-314
    • /
    • 2017
  • Stick-PC is small and portable, So it can be used like a desktop if you connect it to a display device such as a monitor or TV anytime and anywhere. Accordingly, Stick-PC can related to various crimes, and various evidence may remain. Stick-PC uses the same Windows version of the operating system as the regular Desktop, the artifacts to be analyzed are the same. However, unlike the Desktop, it can be used as a meaningful information for forensic investigation if it is possible to identify the actual user and trace the usage by finding the traces of peripheral devices before analyzing the system due to the mobility. In this paper, We presents a method of collecting images using Bootable OS, which is one of the image collection methods of Stick-PC. In addition, we show how to analyze the trace of peripheral connection and network connection trace such as Display, Bluetooth through the registry and event log, and suggest the application method from the forensic point of view through experimental scenario.

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.

Remarkable Structure Relaxation of Zeolite Windows in Rb₃- and K₃-A Crystal Structures of $M_3nA_{9-x}H_xSi_{12}Al_{12}O_{48}$ where M-Rb or K and x=1 or 0

  • 박종삼;윤명숙;임우택;김명철;서숭혁;허남호
    • Bulletin of the Korean Chemical Society
    • /
    • v.16 no.10
    • /
    • pp.923-929
    • /
    • 1995
  • Four crystal structures of M3-A (M3Na9-xHx-A, M=Rb or K and x=1 or 0), Rb3Na8H-A(a=12.228(1) Å and R1=0.046), Rb3Na9-A (a=12.258(3) Å and R1=0.058), K3Na8H-A (a=12.257(3) Å and R1=0.048) and K3Na9-A (a=12.257(3) Å and R1=0.052), have been determined by single crystal x-ray diffraction technique in the cubic space group Pm3^m at 21 ℃. In all structures, each unit cell contained three M+ ions all located at one crystallographically distinct position on 8-rings. Rb+ ions are 3.12 and 3.21 Å away respectively from O(1) and O(2) oxygens, about 0.40 Å away from the centers of the 8-rings, and K+ ions are 2.87 and 2.81 Å apart from the corresponding oxygens. These distances are the shortest ones among those previously found for the corresoponding ones. Eight 6-rings per unit cell are occupied by eight Na+ ions, each with a distance of 2.31 Å to three O(3) oxygens. The twelfth cation per unit cell is found as Na+ opposite 4-ring in the large cavities of M3Na9-A and assumed to be H+ for M3Na8H-A. With these noble non-framework cationic arrangements, larger M+ ions preferably on all larger 8-rings and the compact Na+ ions on all 6-rings, the bond angles in the 8-rings of M3-A, 145.1 and 161.0 respectively for (Si,Al)-O(1)-(Si,Al) and (Si,Al)-O(2)-(Si,Al), turned out to be remarkably stable and smaller, by more than 12 to 17°, than the corresponding angles found in the crystal structures of zeolites A with high concentration of M+ ions. It is to achieve these remarkably relaxed 8-rings, the main windows for the passage of gas molecules, with simultaneously maximized cavity volumes that M3-A have been selected as one of the efficient zeolite A systems for gas encapsulation.

A Study on Problems and Improvement Plans of Non-Face-to-Face Midi Classes (비대면 미디 수업의 문제점과 개선 방안 연구)

  • Baek, Sung-Hyun
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.4
    • /
    • pp.267-277
    • /
    • 2021
  • Both teachers and learners should participate in non-face-to-face class due to COVID-19. The non-face-to-face class has brought about many problems, where they made adequate preparations for such abrupt situation. This study attempted to understand and improve problems occurring during non-face-to-face midi class. The findings are as follows: First, there were differences in equipment available to contact and non-face-to-face class. Such a problem could be improved by using Reaper, DAW which can be installed and freely utilized without any functional limits, regardless of the types of operating systems. Second, latency could not be reduced, when the screen share function of Zoom was used, since it was impossible to select audio interface's drivers in DAW. This problem was improved by again receiving audio output as input and sending it, from the perspectives of teachers. In addition, learners who used the operating system of Windows and have no audio interfaces usually suffer from latency during practices. The latency can be reduced by installing Asio4all. Third, image degradation and screen disconnection phenomena occurred due to the lack of resource. Two computers were connected by using a capture board and the screen disconnection phenomena could be improved by distributing resources and maintaining high-resolution. The system for allowing non-face-to-face midi class could be successfully established, as one more computer was connected by using Vienna Ensemble Pro and more plug-ins were used by securing additional resources. Consequently, the problems of non-face-to-face midi class could be understood and improved.

Analysis of Anti-Reversing Functionalities of VMProtect and Bypass Method Using Pin (VMProtect의 역공학 방해 기능 분석 및 Pin을 이용한 우회 방안)

  • Park, Seongwoo;Park, Yongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.11
    • /
    • pp.297-304
    • /
    • 2021
  • Commercial obfuscation tools (protectors) aim to create difficulties in analyzing the operation process of software by applying obfuscation techniques and Anti-reversing techniques that delay and interrupt the analysis of programs in software reverse engineering process. In particular, in case of virtualization detection and anti-debugging functions, the analysis tool exits the normal execution flow and terminates the program. In this paper, we analyze Anti-reversing techniques of executables with Debugger Detection and Viralization Tools Detection options through VMProtect 3.5.0, one of the commercial obfuscation tools (protector), and address bypass methods using Pin. In addition, we predicted the location of the applied obfuscation technique by finding out a specific program termination routine through API analysis since there is a problem that the program is terminated by the Anti-VM technology and the Anti-DBI technology and drew up the algorithm flowchart for bypassing the Anti-reversing techniques. Considering compatibility problems and changes in techniques from differences in versions of the software used in experiment, it was confirmed that the bypass was successful by writing the pin automation bypass code in the latest version of the software (VMProtect, Windows, Pin) and conducting the experiment. By improving the proposed analysis method, it is possible to analyze the Anti-reversing method of the obfuscation tool for which the method is not presented so far and find a bypass method.

A Rapid Signal Acquisition Scheme for Noncoherent UWB Systems (비동기식 초광대역 시스템을 위한 고속 신호 동기획득 기법)

  • Kim Jae-Woon;Yang Suck-Chel;Choi Sung-Soo;Shin Yo-An
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.331-340
    • /
    • 2006
  • In this Paper, we propose to extend the TSS-LS(Two-Step Search scheme with Linear search based Second step) scheme which was already proposed by the authors for coherent UWB(Ultra Wide Band) systems, to rapid and reliable acquisition of noncoherent UWB systems in multipath channels. The proposed noncoherent TSS-LS employing simple energy window banks utilizes two different thresholds and search windows to achieve fast acquisition. Furthermore, the linear search is adopted for the second step in the proposed scheme to correctly find the starting point in the range of effective delay spread of the multipath channels, and to obtain reliable BER(Bit Error Rate) performance of the noncoherent UWB systems. Simulation results with multipath channel models by IEEE 802.15.3a show that the proposed two-step search scheme can achieve significant reduction of the required mean acquisition time as compared to general search schemes. ]n addition, the proposed scheme achieves quite good BER performance for large signal-to-noise ratios, which is favorably comparable to the case of ideal perfect timing.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

The Study on the Effect of Elevator Movement on the Pressure Difference between Vestibule and Living room in High-rise Buildings (초고층 건축물에서 엘리베이터 구동이 부속실과 화재실 간 차압형성에 미치는 영향연구)

  • Park, Younggi;Hong, Kibea;Ryou, Hong Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.85-91
    • /
    • 2018
  • Recently, there have been a lot of casualties due to fires in high-rise buildings. The toxic gases and smokes generated by fires in high-rise buildings spread rapidly through the elevator shaft and stairwell, due to the stack effect, and can cause critical casualties. To reduce the number of casualties, smoke control systems have been introduced. Smoke control systems play an essential role in preventing the spread of smoke in high-rise buildings and securing the evacuation route. Also, in high-rise buildings, evacuation by an elevator is considered to be indispensable. However, the pressure field in the shaft is strongly disturbed when the elevator is moving and this can affect the performance of the smoke control system. Therefore, in this study, we experimentally and numerically analyzed the effect of elevator movement on the pressure difference between the vestibule and living room by building a model using the sandwich pressurization method based on the performance based design. To consider the leakage areas in high-rise buildings, e.g. the windows, fire door and elevator, the National Fire Safety Codes and area ratio were used. The elevator speed in the model building was varied between 20 m/s and 100 m/s corresponding to a real elevator speed of 7 m/s~17 m/s. As a result, the relationship between the pressure difference and elevator speed was found to be ${\Delta}P=40{\cdot}{\exp}$(-Ves /-104.7)-23.735. This result can be used to take into consideration the effect of elevator movement when designing smoke control systems.