• Title/Summary/Keyword: function-safe

Search Result 728, Processing Time 0.026 seconds

A Study on the Strength of the Helmets with a Lobe in the Summit (정상 돌출부를 갖는 안전모의 강도 안전성에 관한 연구)

  • Kim, Chung Kyun
    • Journal of the Korean Institute of Gas
    • /
    • v.17 no.5
    • /
    • pp.37-41
    • /
    • 2013
  • This paper presents the strength safety of stress and deformation behaviors using the finite element method as a function of the thickness of the protective helmets with and without an extruder on the top of the shell structure. The helmet that would provide head and neck protections without causing discomfort to the user when it was worn for long periods of time should be manufactured for increasing the safety and impact energy absorption. The stress analyzed results show that when the impulsive force of 4,540N is applied on the top surface of a helmet, the safe thickness is 3.7mm for the conventional helmet and 3.2mm for the modified new helmet. Based on the deformation analysis, the FEM results recommend that the safe thickness is 3.2mm for the conventional helmet and 2.0mm for the modified new helmet. Thus, it may be more safe design of the helmet, which has an extruded structure on the summit surface of the helmet.

One time password key exchange Authentication technique based on MANET (MANET 기반 원타임 패스워드 키교환 인증기법)

  • Lee, Cheol-Seung;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1367-1372
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on MANET and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier. The suggested authentication technique requires exponentiation and is applicable in the wireless network environment because it transmits data at a time for key sharing, which proves it is a strong and reliable authentication technique based on the complete MANET.

A Method for Effective Mobile Electronic Notification Service of Private Institutions

  • Kim, JongBae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.194-200
    • /
    • 2022
  • Traditionally, postal services that produce and deliver paper-based notices have been the mainstream. The reason is that it has the function of distribution and proof of delivery in the postal delivery system as well as the advantage of information delivery through postal delivery. After all, for the purpose of distribution and proof of delivery, many organizations use paper-based postal notices. However, in recent years, it has been in the spotlight to produce a paper-based postal notice as an electronic notice and deliver information to a mobile device through the Internet. In this paper, we propose a safe interworking method for user identification information required for private institutions to transmit mobile electronic notices. In order for a private institution to accurately deliver an electronic notice to a mobile service subscriber, a means to confirm whether the private institution and the mobile device subscriber are the same person is required. In the mobile electronic notification service, the connecting information provided by the personal identity proofing agency is used as a means of user identification. Connecting information is called a resident registration number on the Internet and is one-way hash information that can only be created by the personal identity proofing agency designated by the government. In order to transmit a mobile electronic notice, it is necessary to share connecting information for the same user identification between the institution that requests the sending of the electronic notice and the institution that processes the sending of the electronic notice. Connecting information is personal information that can uniquely identify a user, and if it is disclosed, damage such as personal information infringement may occur. As such, it is necessary to prevent problems that may arise from misuse and abuse of connecting information as well as increase in the benefits of sending the mobile electronic notice. In this paper, a safe and effective mobile electronic notification service can be performed by suggesting a method for safe interworking of information related to the mobile electronic notification service.

A Study on the Evaluation of Linear Cumulative Damage Factor of Membrane Type LNG Tank by use of Probability Density Function (확률밀도함수를 이용한 멤브레인방식 LNG탱크의 선형누적손상도 평가에 관한 연구)

  • 김종호
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.28 no.6
    • /
    • pp.993-999
    • /
    • 2004
  • The estimation of fatigue life at the design stage of membrane type LNG tank is very important in order to arrive at feasible and cost effective solutions considering the total lifetime of the tank. In this study, the practical procedure of fatigue life prediction by use of cumulative damage factors based on Miner-Palmgren hypothesis and probability density function has been shown with the corner region of Gaz Transport Membrane type LNG tank being used as an example. In particular the parameters of Weibull distribution that determine the stress spectrum are discussed. The main results obtained from this study are as follows: 1. The recommended value for the shape parameter of Weibull distribution for the LNG tank is 1.1 in case of using the direct calculation method proposed in this study. 2. The calculated fatigue life is influenced by the shape parameter of Weibull distribution and stress block. The safe fatigue design can be achieved by using higher value of shape parameter and the stress blocks divided into more stress blocks.

Effects of Group Exercise Program Tailored by Physical Fitness on Perceived Health Status, Physical Strength, Depression and Cognitive Function of the Elderly (체력에 따른 그룹별 맞춤형 운동 프로그램이 노인의 지각된 건강 상태, 체력, 우울 및 인지기능에 미치는 효과)

  • Shin, Mee-Kyung;Shin, Su-Jin
    • Korean Journal of Adult Nursing
    • /
    • v.20 no.4
    • /
    • pp.613-625
    • /
    • 2008
  • Purpose: The purpose of this study was to identify the effects of the tailored group exercise program on perceived health status, physical strength, depression and cognitive function in seniors. Methods: The subjects were 42 seniors of the experimental group and 28 seniors of the control group. The exercise program tailored by physical fitness was carried out for 16 weeks. The dependent variables were measured by Perceived Health Status Scale, The Senior Fitness Test, MMSE-K, and GDS-K. The collected data were analyzed by Fisher's exact test, Chi-square test and t-test, and ANCOVA using the SAS program. Results: In terms of physical strength and depression there was significant difference among groups. Perceived health status and cognitive function were not significant different among groups. Conclusion: In this study, the tailored exercise program was effective and safe for the elderly, and resulted in improving physical and psychological health status in the elderly. This demonstrated that the tailored group exercises program on the basis of the subject's fitness, played an essential role in maintaining and improving the health.

  • PDF

A Study on the Privatization of the Function Security to Improve Efficiency in Function of the Police (경찰기능의 효율성 제고를 위한 경비기능의 민영화 방안)

  • Han, Heung-Tai
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.306-335
    • /
    • 2000
  • The desires for safety of body and life can be said to be fundamental and natural in human beings. But the rapid industrialization and urbanization phenomena in our modern society is accelerating the treand for increasing diverse social pathology. Rise of serious crimes such as robbery and rape has already become an especially serious social problem and is at the point of threatening our welfare and social order. But the police, which is primarily responsible for the maintenance of welfare and social order of the public, is unable to respond actively to the increasing demand for policing due to the lack of available manpower and overwork. Thus, the purpose of this thesis is to look for a plan to actively respond to the daily increasing outcry for law and order so that the public may maintain safe and happy lifestyles without the threat of crime. One concrete and practical strategy is to resolutely separate and transfer some of the many functions of the police that can be handled by citizen organizations to those groups so that the police can be relied upon to become functionally efficient. This will decrease the work of the police, thereby allowing the police to concentrate on its inherent responsibilities. As its primary example, 'transferring the function of security' of the police to the private security industry is suggested in this thesis.

  • PDF

A Case Study of a Soeumin Patient with Jaundice Diagnosed as Greater-Yin Accompanied Jaundice Pattern (태음병 황달증으로 진단한 소음인 황달 환자 치험 1례)

  • Lee, Mi-Suk;Bae, Na-Young
    • Journal of Sasang Constitutional Medicine
    • /
    • v.28 no.3
    • /
    • pp.258-266
    • /
    • 2016
  • Objectives This case study is about a Soeumin patient with jaundice identified as Greater-Yin accompanied Jaundice pattern. In this study, we report significant improvements of anorexia, dyspepsia, fatigue and weight loss after treatment with Hyangsayangyi-tang, Insambaekhaogwanjung-tang and acupuncture.Methods The patient was identified as Greater-Yin accompanied Jaundice pattern and treated with Hyangsayangyi-tang, Insambaekhaogwanjung-tang and acupuncture. The Global Assessment Scale (GAS) was used to assess the improvements of anorexia, dyspepsia, fatigue and pelvic pain after the treatment. And the liver function test was performed to measure the overall function of the liver.Result and Conclusion The symptoms of anorexia, dyspepsia, fatigue and pelvic pain were improved from GAS 100 to GAS 0-10 for four months. And The liver function test showed improved the response to treatment. The levels of AST (aspartate aminotransferase)/ALT (alanine aminotransferase) decreased from 43/42 to 29/14 IU/L. The level of total bilirubin was decreased from 2.7 to 1.9 mg/dL. Furthermore total weight gain was 8 kg from starting weight of 36.5 kg for four months. In conclusion, this study shows that Sasang constitutional medicine can be effective and safe treatment for the Soeumin patient with jaundice.

Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System (효율성을 고려한 해시 함수 기반의 안전한 RFID 인증 프로토콜)

  • Kim, Ik-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.428-434
    • /
    • 2009
  • Many RFID authentication protocols have been proposed to build a secure ubiquitous environment. However, existing protocols do not respond recent attacks appropriately and they perform many hash operations to authenticate a large number of tags. In this paper, we propose a hash function-based secure authentication protocol for improving efficiency in RFID system. The proposed protocol is safe to passive attacks and active attacks, and requires only 2 hash operations in a tag and 3 hash operations in a database. Accordingly, the proposed protocol is very effective in RFID system environment which is composed to low-cost tags and a database handling many tags.

Symmetry structured SPN block cipher algorithm (대칭구조 SPN 블록 암호 알고리즘)

  • Kim, Gil-Ho;Park, Chang-Soo;Cho, Gyeong-Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1093-1100
    • /
    • 2008
  • Feistel and SPN are the two main structures in designing a block cipher algorithm. Unlike Feistel, an SPN has an asymmetric structure in encryption and decryption. In this paper we propose an SPN algorithm which has a symmetric structure in encryption and decryption. The whole operations in our SPN algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2, applies function and the last half of them, (N+1)/2 to N, employs inverse function. Symmetry layer is executed to create a symmetry block in between function layer and inverse function layer. AES encryption and decryption algorithm, whose safety is already proved, are exploited for function and inverse function, respectively. In order to be secure enough against the byte or word unit-based attacks, 32bit rotation and simple logical operations are performed in symmetry layer. Due to the simplicity of the proposed encryption and decryption algorithm in hardware configuration, the proposed algorithm is believed to construct a safe and efficient cipher in Smart Card and RFID environments where electronic chips are built in.

  • PDF

An Assessment of Allograft Function in Canine Single Lung Transplantation (일측 폐이식 실험견에서 이식폐의 기능 평가연구)

  • 박창권
    • Journal of Chest Surgery
    • /
    • v.28 no.12
    • /
    • pp.1096-1106
    • /
    • 1995
  • We experienced 7 cases of left single lung transplantation in 14 mongrel dogs and analyzed graft lung function by hemodynamics, blood gas analysis, chest X-ray, biopsy and perfusion lung scan. We performed right pulmonary artery cuff[PA cuff for analysis of graft lung function in 3 cases. The donor lungs were flushed with modified Euro-Collins solution[n=3 or low potassium dextran glucose solution[n=4 and preserved for 4 to 5 hours[n=4 or 24 hours[n=3 at 10o C and implanted to the dogs with similar weight . Assessment of left graft lung was done by occluding the right pulmonary artery for 10 minutes using PA cuff. Assessment for graft lung function was done immediately after an operation and after 3 days, 7days and 3 weeks postoperatively. Four dogs survived for 3days, 7days[2 cases and 3 weeks respectively. Other three dogs expired within 3 hours of reperfusion. Immediate perfusion scans of left lung in four survived dogs after reperfusion were 42.1%, 36% , 11% and 5.9% respectively, and another dog with 4.8% perfusion to left lung was dead due to left atrial thrombi after 3 hours reperfusion. In one case among three acute rejections follow-up perfusion scan was done on 3rd and 11th postoperative day and the result decreased from 36% perfusion immediate postoperatively to 21% and 15% respectively. Three expired dogs postoperatively couldn`t tolerate occlusion of right pulmonary artery with above 40 mmHg of mean pulmonary artery pressure. On the other hand, three survival dogs postoperatively tolerated occlusion of right pulmonay artery with less than 30 mmHg of mean pulmonary artery pressure. and one dog couldn`t tolerate same procedure immediate postopertively but in 2 hours reperfusion later tolerated with 29 mmHg of mean pulmonary artery pressure.In conclusion we couldn`t compare the effect of two flushing solutions but low potassium dextran glucose solution showed relatively safe preservation effect in cases with preservation of more than 20 hours. Also canine left single lung transplantation model with PA cuff indicated useful method for the assessment of graft lung function with effect of lung preservation.

  • PDF