• 제목/요약/키워드: concealment

검색결과 345건 처리시간 0.027초

Preparation and Consideration of Sample Collection in Undeclared Areas for Denuclearization Verification

  • Kim, Dong Yeong;Kim, Giyoon;Lee, Jun;Lim, Kyung Taek;Chung, Heejun;Seo, Jihye;Kim, Myungsoo
    • 방사성폐기물학회지
    • /
    • 제19권4호
    • /
    • pp.479-489
    • /
    • 2021
  • The Republic of Korea is expected to participate in the denuclearization verification activities by the International Atomic Energy Agency (IAEA) in case any neighboring countries declared denuclearization. In this study, samples for the verification of nuclear activities in undeclared areas were selected for the denuclearization of neighboring countries, and the appropriateness of the procedures was considered. If a country with nuclear weapons declares denuclearization, it must be accompanied by the IAEA's verification regarding nuclear materials and weapons in the declared and undeclared areas. The analysis of the process samples or on-site environmental samples and the verification of undeclared nuclear facilities and materials aid in uncovering any evidence of concealment of nuclear activity in undeclared areas. Therefore, a methodology was established for effective sampling and analysis in accordance with proper procedures. Preparations for sampling in undeclared areas were undertaken for various potential scenarios, such as, the establishment of zones according to radiation dose, methods of supplying electricity, wireless communication networks, targets of sampling according to characteristics of nuclides, manned sampling method, and unmanned sampling method. Through this, procedures were established for pre- and post-site settings in preparation for hazards and limiting factors at nuclear inspection sites.

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • 제9권4호
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.

포스트하위문화 관점의 한국 타투문화 (Tattoo Culture in Korea from the Perspective of Post-subculture)

  • 김가현;하지수
    • 한국의류학회지
    • /
    • 제46권1호
    • /
    • pp.63-79
    • /
    • 2022
  • This study investigated the phenomenon of modern people enjoying tattoo culture in Korea from the perspective of post subculture. A qualitative study was conducted using both literature review and in-depth interview methods. For post-subculture perspectives, the theories of Maffesoli (2017) and Thornton (1996), which are suitable for interpreting contemporary tattoo culture, were reviewed in terms of seven concepts: sporadic network, grouping, fluid participation, temporary emotional bond, self-distinction, pursuit of underground culture, and display and concealment. Semi-structured questionnaires were constructed and administered based on the organized characteristics. Five cultural qualities of the tattoo phenomenon in Korea were derived based on post-subculture concepts. Sporadic formation is related to the pattern of inflow into tattoo culture, and "streaming" participation is based on fluid participation and temporary ties. Distinction within subculture is based on self-distinction and pursuit of underground. The costume-playing ordinary concept includes the characteristic of controlling the exposure of tattoos in society. Finally, formation of the consumer tattoo market was newly discovered in Korean tattoo culture.

애니메이션 분야의 심미적 인식에 의한 동일시와 동기화 연출 (Directed Identification, Synchronization by Aesthetic Recognition of Animation Field)

  • 이현우;류창수
    • 한국멀티미디어학회논문지
    • /
    • 제25권10호
    • /
    • pp.1475-1482
    • /
    • 2022
  • Mickey Mousing perfect match between animation sound and image was an aesthetic in the field of animation, but since the 2000s, works such as and released by producers such as DreamWorks and Pixar have expanded the perfection of synchronization to irony. It also influenced the identification system of sentiment. It is time to view the directing attempt of these elements as a factor that changed the new paradigm of narrative, and related research is needed. In this study, the scene of was analyzed as a case study for the synchronization of animation sound and image components and the boundary direction on the recognition of identification between reality and fiction. Aesthetic recognition of the research work is based on the premise of real time and space perception, and the audience can recognize in the conceptual world as an integrated art by playfully producing fictional time and space. The direct antithesis of synchronization and identification was drawn to maintain the curiosity of the next scene by repeating selective concealment and disclosure of information in the direction of conveying an unfamiliar and heterogeneous feeling to the audience.

국방 분야에서 일부 노출된 물체 인식 향상에 대한 연구 (Enhancing Object Recognition in the Defense Sector: A Research Study on Partially Obscured Objects)

  • 김영훈;권현
    • 융합보안논문지
    • /
    • 제24권1호
    • /
    • pp.77-82
    • /
    • 2024
  • 최근 연구를 통해 다양한 물체 탐지 및 분류 모델은 전반적으로 크게 성능 향상이 이루워졌지만, 물체가 부분적으로 노출된 상황에서의 물체 탐지 및 분류에 대한 연구는 미흡한 실정이다. 특히, 군사 분야에서 무인전투체계가 물체를 탐지하고 분류하는 데 사용되는 경우, 군사적 상황에서 물체는 일반적으로 부분적으로 가려진 상태나 위장된 상태일 가능성이 높다. 본 연구에서는 부분적으로 가려진 물체의 분류 성능을 향상시키는 방법을 제안한다. 이 방법은 물체 이미지 상에 특정 부분을 주변 환경을 고려하여 가리는 부분을 추가하여 은·엄폐 및 위장된 물체에 대한 분류 성능을 개선시켰다. 실험결과로 제안 방법을 적용하였을 때 은·엄폐 및 위장된 물체에 대해서 기존 방법에 비해 물체 분류 향상이 있음을 볼 수가 있었다.

블록기반 부호화 비디오에서 인과적 블록 경계정합을 이용한 적응적 오류 검출 (Adaptive Error Detection Using Causal Block Boundary Matching in Block-Coded Video)

  • 주용수;김태식;김남철
    • 한국통신학회논문지
    • /
    • 제29권8C호
    • /
    • pp.1125-1132
    • /
    • 2004
  • 본 논문에서는 블록기반으로 부호화된 비디오 영상에서 전송 오류로 인하여 발생하는 화질저하를 개선하기 위하여 인과적 블록경계 정합법을 사용하여 효율적으로 복호가능 오류를 검출하는 알고리즘을 제안하였다. 제안된 방법에서는 먼저 현재 블록의 경계들과 인과적 주위블록외 경계들간 부정합 전력을 계산한다. 다음, 이렇게 구한 부정합 전력들 중 하나라도 인과적 주위 블록들의 통계적 특성을 사용하여 적응적으로 구한 역치보다 크면 오류가 있는 것으로 판단한다. 실제로 H.263으로 부호화된 비디오를 가지고 $10^{-3}$-$10^{-4}$ BERs에서 16비트 연속적인 비트 에러를 가지는 환경에서 제안한 방법을 적용하였다. 기존의 블록경계정합 오류검출법의 하나인 Zeng의 방법과 비교하면, 에러 검출율의 향상은 최대 20%, 그리고 검출된 오류를 은닉 처리한 결과영상의 PSNR 향상은 최대 3.5㏈임을 보여준다.

병실 분위기 조성에 영향을 주는 요인 (The Influencing Factors forming the Atmosphere of Ward)

  • 윤정인;이미라
    • 대한간호학회지
    • /
    • 제25권4호
    • /
    • pp.641-652
    • /
    • 1995
  • Working as nurses, authors found that some patients were not content with their hospital life. Some patients wanted to move to another ward, and others complained about their ward atmosphere. In spite of patients' discomfort, nurses didn't know what made some patients complain about their ward. So, authors tried to find factors that influence atmosphere of hospital wards of the neurosurgery patients. To know the atmosphere of wards, authors selected five neurosurgery ward of a university hospital in Seoul. Observation took a month. An author observed using molar approach, in the morning, in the day time, and in evening time. Authors used concealment /no intervention technique. An author checked condition of people in the wards, and observed their verbal and nonverbal communication behavior their activities and environmental characteristics, and interpreted their meaning through ethnographic research methodology by Spradly. Authors found there was an important factors that influence the atmosphere of ward. It was a human and his attitude. At least one person who was willing to help others made ward atmosphere better. Helping others physically whenever needed, sup-porting the depressed emotionally, offering foods, or talking to others friendly brought good atmosphere. On the contrary, if everyone was indiffernt to others, the atmosphere became cold. Self-centered or selfish behaviors such as occupying too much area, using the toilet too long, covering other's suction bottle without permission and seeing others delicate or urinate were hurtful. In addition to the attitude of patients and their families, unkindness of medical teams including nurses and doctors and tasteless meal caused bad ward atmosphere. Based on this research finding, authors suggest the followings. A For the better atmosphere of ward 1. Nurses should try to make the ward atmosphere better by introducing new patient to older ones. 2. Every ward should have dividing curtains to keep patient's privacy. 3. All hospital personnel should be kind enough to make patients feel that they are repected. 4. Hospital should serve high quality meals to patients. 5. Patients had better stay with those in the similar condition. B. For the future studies 1. Repeated researches are necessary to check reliability of this results. 2. Researches for patients in different area such as ICU, or hemodialysis unit are necessary.

  • PDF

정현파 모델 부호화기를 위한 MP(Matching Pursuit) 알고리즘과 파라미터 양자화기 (Matching Pursuit Estimation and Quantizer Design for Sinusoidal Model-based Coder)

  • 안영욱;정규혁;김종학;양용호;이인성
    • 한국음향학회지
    • /
    • 제24권7호
    • /
    • pp.402-409
    • /
    • 2005
  • 본 논문에서는 고대역 (4kHz-8kHz)의 주기적 성분이 강하게 나타나는 신호에 대해서 MP (Matching Pursuit) 알고리즘을 이용한 부호화 방법을 제안한다. 또한 분석된 스펙트럼 크기 파라미터와 위상 파라미터의 효율적인 양자화 방법을 제안한다. MP 알고리즘은 오류 상쇄 원리와 정현파 모델에 바탕을 두고 있기 때문에 정확한 피치 주기 예측이 필요하다. 고대역의 정확한 피치 주기 예측을 위해 저대역 (0kHz-4kHz) 신호에서 검출한 피치 주기를 이용함으로써 부호화와 비트할당의 효율을 높일 수 있다. 스펙트럼 크기 계수의 양자화를 위해 계수들에 대해 고정 차원 이산코사인 변환 (MDCT : Modified Discrete Cosine Transform) 및 다단계 (multi-stage) 구조를 결합시킨 양자화 기법을 사용하였고, 위상 값들은 스펙트럼 크기에 따른 가중치 필터와 위상의 $2{\pi}$ 순환 특성을 이용하여 양자화하였다. 또한 제안한 양자화 기법과 부호화 방법을 음성 분석-합성 (analysis-by-synthesis) 시스템에 적용하여, 목적 신호와의 비교를 통해 검증한다. 향후 대역 분할을 기본 구조로 하는 계층 구조의 광대역 음성부호화기에의 적용 가능성을 제시한다.

Axillary Reconstruction for Hidradenitis Suppurativa with an Inner-Arm Transposition Flap Creating a Brachioplasty Effect

  • Ching, Daniel L.;Mughal, Maleeha;Papas, Athanasios;Soldin, Mark
    • Archives of Plastic Surgery
    • /
    • 제44권3호
    • /
    • pp.228-233
    • /
    • 2017
  • Background Hidradenitis suppurativa (HS) is a chronic skin condition that can affect any area with apocrine sweat glands and has the potential to involve multiple sites concurrently. Commonly affected sites include the axilla, groin, perineum and perianal areas. In this study we performed a literature review on the surgical methods for HS and describe an innovative technique for reconstructing axilla HS using an inner-arm transposition flap. Methods We reviewed all cases (5 cases from 4 patients) of transposition flap reconstruction performed by the senior author at a single London tertiary hospital from 2008-2013. Patient related outcome measures were collected using the Derriford appearance scale (DAS 24) and a study specific questionnaire. Results All patients were satisfied with their final result. One out of five cases had a complication but did not result in flap failure. There is no disease recurrence to date. DAS 24 scores collected demonstrated acceptable postoperative distress that did not deviate far from the norm tables while study specific questionnaire reveal desirable outcomes. Conclusions We have managed to achieve our aim through the use of the innovative inner-arm transposition flap. Our study hopes to provide an additional technique for axillary reconstruction. This technique offers the effective concealment of scars with the benefit of tightening of the arm tissue producing 'brachioplasty like' effects. All things considered it would be reasonable to conclude the innovative flap technique is a reliable, effective, and simple method that results in multiple benefits.

Affordable method of video recording for ecologists and citizen-science participants

  • Yang, Eunjeong;Lee, Keesan;Ha, Jung-moon;Kim, Woojoo;Song, Ho-Kyung;Hwang, Injae;Lee, Sang-im;Jablonski, Piotr G.
    • Journal of Ecology and Environment
    • /
    • 제42권2호
    • /
    • pp.85-89
    • /
    • 2018
  • Observations and video documentation of interactions between animals living in dens, cavities, and other enclosed spaces are difficult, but they play an important role in field biology, ecology, and conservation. For example, bird parents visiting nests and feeding their nestlings may provide crucial information for testing of ecological hypotheses and may easily attract attention of participants of citizen-science ecological and conservation projects. Because of the nest concealment of cavity-nesting birds, their behaviors in the nest can only be studied by using video surveillance. Professional wildlife surveillance systems are extremely expensive. Here, we describe an inexpensive video setup that can be constructed with relatively little effort and is more affordable than any previously described system. We anticipate that the relatively low cost of about 250 USD for a battery-operated system is an important feature for citizen-science type of projects and for applications in heavily populated areas where the potential for theft and vandalism may be high. Based on our experiences, we provide methodological advice on practical aspects of using this system in the field for ecological research on birds. We highlight the low cost, easiness of construction, and potential availability to a large number of observers taking part in wildlife monitoring projects, and we offer technical help to participants of such research projects.