• Title/Summary/Keyword: making techniques

Search Result 1,309, Processing Time 0.03 seconds

Study on the Gel Cleaning System for Removal of Poly (vinyl acetate) Fixative of the Mural Paintings of the Payathonzu Temple in Bagan, Myanmar (I) - Focusing on Properties and Removability of Gel Cleaners -

  • Yu, Yeong Gyeong;Han, Gyu-Seong;Lee, Hwa Soo;Han, Kyeong Soon
    • Journal of Conservation Science
    • /
    • v.37 no.4
    • /
    • pp.370-379
    • /
    • 2021
  • In the past, PVAc [poly(vinyl acetate)] was used as a fixative for the conservation of the murals in the murals of the Payathonzu temple located in Bagan, Myanmar. In this study, attention was paid to gel cleaning as a method for stably removing such PVAc fixatives. Based on the recent research trend related to the cleaning of murals in Bagan ruins, 3 types of gelling agents (Nevek®, Laponite®RD, Carbopol®980) and 2 types of organic solvents (Acetone, Dimethyl carbonate) were selected. Six types of gel cleaners were prepared by mixing gelling agents and organic solvents, and the properties and fixative removability of these cleaners were compared. As a result of confirming the properties of the prepared gel cleaners, the pH of the cleaners was all in the weak acidic to weakly alkaline range, which was a stable condition for mural application. Also, there was no difference in the viscosity of the cleaners depending on the type of solvent, but there was a difference depending on the type of gelling agent used. Regarding the weight loss ratio of PVAc, which is an indicator of removability, the exposure conditions of the gel cleaners, the boiling point of the solvent used, and the viscosity of the gelling agent acted as factors affecting. As a result of comparing the removability of gel cleaners, it was confirmed that the solvent's fixative solubility, the volatility of the solvent itself, and the solvent release control properties of the gelling agent had a great effect on the removability of the gel cleaners. In Part 2, the stability and the running applicability of the gel cleaners will be investigated by making mockup samples reflecting the properties of the materials and techniques used to produce the mural paintings in the Payathonzu Temple.

Parts Management Method for Weapon System Parts Standardization (무기체계 부품 표준화를 위한 부품관리 방안)

  • Jung, Hyun-Woo;Shim, Bo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.409-417
    • /
    • 2021
  • The standardization of weapon system parts is one of the elements of parts management and is an important factor for reducing the cost of acquiring and maintaining a weapon system, enhancing its reliability, improving interoperability, alleviating parts obsolescence problems, improving logistics efficiency, and strengthening the military's combat readiness. This study examined how to manage parts of domestic R&D weapon systems, overseas imports weapon system parts, and various commercial parts from a standardization perspective, and to study parts management methods for standardizing parts in the future. This system was used to achieve systematic part standardization in a military weapon system. To this end, this study investigated what elements are used to standardize weapon system parts. The importance and weight of each element were calculated using the AHP (Analytic Hierarchy Process), one of the decision-making techniques, and the design stage standards using the part selection method were studied. Through this, the selection process of standard parts, which has been made according to the experience and subjective judgment of designers and personnel, was improved to propose a systematic and objective method of standardizing weapons parts.

Response System for DRDoS Amplification Attacks (DRDoS 증폭 공격 대응 시스템)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.22-30
    • /
    • 2020
  • With the development of information and communication technology, DDoS and DRDoS continue to become security issues, and gradually develop into advanced techniques. Recently, IT companies have been threatened with DRDoS technology, which uses protocols from normal servers to exploit as reflective servers. Reflective traffic is traffic from normal servers, making it difficult to distinguish from security equipment and amplified to a maximum of Tbps in real-life cases. In this paper, after comparing and analyzing the DNS amplification and Memcached amplification used in DRDoS attacks, a countermeasure that can reduce the effectiveness of the attack is proposed. Protocols used as reflective traffic include TCP and UDP, and NTP, DNS, and Memcached. Comparing and analyzing DNS protocols and Memcached protocols with higher response sizes of reflective traffic among the protocols used as reflective traffic, Memcached protocols amplify ±21% more than DNS protocols. The countermeasure can reduce the effectiveness of an attack by using the Memcached Protocol's memory initialization command. In future studies, various security-prone servers can be shared over security networks to predict the fundamental blocking effect.

An Artificial Intelligence Approach for Word Semantic Similarity Measure of Hindi Language

  • Younas, Farah;Nadir, Jumana;Usman, Muhammad;Khan, Muhammad Attique;Khan, Sajid Ali;Kadry, Seifedine;Nam, Yunyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2049-2068
    • /
    • 2021
  • AI combined with NLP techniques has promoted the use of Virtual Assistants and have made people rely on them for many diverse uses. Conversational Agents are the most promising technique that assists computer users through their operation. An important challenge in developing Conversational Agents globally is transferring the groundbreaking expertise obtained in English to other languages. AI is making it possible to transfer this learning. There is a dire need to develop systems that understand secular languages. One such difficult language is Hindi, which is the fourth most spoken language in the world. Semantic similarity is an important part of Natural Language Processing, which involves applications such as ontology learning and information extraction, for developing conversational agents. Most of the research is concentrated on English and other European languages. This paper presents a Corpus-based word semantic similarity measure for Hindi. An experiment involving the translation of the English benchmark dataset to Hindi is performed, investigating the incorporation of the corpus, with human and machine similarity ratings. A significant correlation to the human intuition and the algorithm ratings has been calculated for analyzing the accuracy of the proposed similarity measures. The method can be adapted in various applications of word semantic similarity or module for any other language.

A Study of Worm Propagation Modeling extended AAWP, LAAWP Modeling (AAWP와 LAAWP를 확장한 웜 전파 모델링 기법 연구)

  • Jun, Young-Tae;Seo, Jung-Taek;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.73-86
    • /
    • 2007
  • Numerous types of models have been developed in recent years in response to the cyber threat posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical modeling techniques such as Epidemic, AAWP (Analytical Active Worm Propagation Modeling) and LAAWP (Local AAWP). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the entire nv4 network and fail to consider the effects of countermeasures, making it difficult to analyze the extent of damage done by them and the effects of countermeasures in a specific network. This paper extends the equations and parameters of AAWP and LAAWP and suggests ALAAWP (Advanced LAAWP), a new worm simulation technique that rectifies the drawbacks of existing models.

A Case Study on Smart Factory Extensibility for Small and Medium Enterprises (중소기업 스마트 공장 확장성 사례연구)

  • Kim, Sung-Min;Ahn, Jaekyoung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.2
    • /
    • pp.43-57
    • /
    • 2021
  • Smart factories can be defined as intelligent factories that produce products through IoT-based data. In order to build and operate a smart factory, various new technologies such as CPS, IoT, Big Data, and AI are to be introduced and utilized, while the implementation of a MES system that accurately and quickly collects equipment data and production performance is as important as those new technologies. First of all, it is very essential to build a smart factory appropriate to the current status of the company. In this study, what are the essential prerequisite factors for successfully implementing a smart factory was investigated. A case study has been carried out to illustrate the effect of implementing ERP and MES, and to examine the extensibilities into a smart factory. ERP and MES as an integrated manufacturing information system do not imply a smart factory, however, it has been confirmed that ERP and MES are necessary conditions among many factors for developing into a smart factory. Therefore, the stepwise implementation of intelligent MES through the expansion of MES function was suggested. An intelligent MES that is capable of making various decisions has been investigated as a prototyping system by applying data mining techniques and big data analysis. In the end, in order for small and medium enterprises to implement a low-cost, high-efficiency smart factory, the level and goal of the smart factory must be clearly defined, and the transition to ERP and MES-based intelligent factories could be a potential alternative.

Case Study on Advanced Fire and Explosion Index (화재폭발지수 개선에 대한 사례 연구)

  • Na, Gun Moon;Seoe, Jae Min;Lee, Mi Jeong;Baek, Jong-Bae
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.6
    • /
    • pp.78-84
    • /
    • 2020
  • The F&EI technique is one of the risk assessments with many advantages. It can save time and effort compared to quantitative risk assessment (QRA). By using the evaluation result of this technique, it is possible to check the effectiveness of the investment cost. In addition, a relative risk ranking can be created and used to establish the facility management cycle and to prioritize investment. However, evaluating the target process can be evaluated more than the actual risk since the LCCF, a loss prevention measure, is too limited. In addition, calculating premiums via this method can result in excessive premiums, making it difficult to evaluate the risk precisely. Therefore, new safety guard was added to the LCCF of the F&EI risk assessment with reference to HAZOP and LOPA techniques. Newly added LCCFs are Deflagration arrester, Check valve, SIS, and Vacuum beaker, etc. As a case study, F&EI risk assessment was performed on Acetone storage tank of a API (Active pharmaceutical ingredient) plant to compare actual MPPD. The estimated loss amount was 592,558$ for the existing technique and 563,571$ for the improved technique, which was reduced by about 5% compared to the previous one.This proved that a more precise evaluation is possible and that the efforts for safety at the workplace are reflected in the evaluation results.

Analysis of Factors Affecting Satisfaction of Korean Cosmetics by Chinese Consumers Using Statistical Analysis Techniques (통계 분석 기법을 이용하여 중국 소비자의 한국 화장품 만족도에 영향을 미치는 요인 분석)

  • Qiu, Yajun;Han, Kai;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.152-159
    • /
    • 2021
  • In the Chinese market, the market share of Korean cosmetics is rapidly increasing and its position in the global market is gradually becoming stable. The reasons why Chinese consumers are enthusiastic about Korean cosmetics are as follows. First of all, Korean cosmetics are suitable for Asian Chinese consumers. Second, the star effect of Korean cosmetics has shown an undoubted effect, making Korean cosmetics rapidly developing and rapidly occupying the Chinese market. Chinese consumers' satisfaction with Korean cosmetics directly affects the Korean cosmetics market. Therefore, the research subject of this study is set to Chinese consumers and focuses on factors that affect Chinese consumers' satisfaction with Korean cosmetics. The "Chinese Consumer Satisfaction with Korean Cosmetics" model is established to find the relevant influencing factors and simulate the hypothesis to analyze and propose the factors that actually affect the satisfaction of Chinese consumers with Korean cosmetics.

Vessel and Navigation Modeling and Simulation based on DEVS Formalism : Case Studies in Collision Avoidance Simulation of Vessels by COLREG (DEVS 형식론 기반의 선박 항해 모델링 및 시뮬레이션 (II) : COLREG 기반 선박 충돌회피 시뮬레이션을 통한 사례연구)

  • Hwang, Hun-Gyu;Woo, Sang-Min;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1700-1709
    • /
    • 2019
  • Recently, many researches have been under way to develop systems (services) to support the safety navigation of ships, and in these studies, common difficulties have been encountered in assessing the usefulness and effectiveness of the developed system. To solve these problems, we propose the DEVS-based ship navigation modeling and simulation technique. Following the preceding study, we analyze the COLREG rules and reflected to officer and helmsman agent models for decision making. Also we propose estimation and interpolation techniques to adopt the motion characteristics of the actual vessel to simulation. In addition, we implement the navigation simulation system to reflect the designed proposed methods, and we present five-scenarios to verify the developed simulation system. And we conduct simulations according to each scenario and the results were reconstructed. The simulation results confirm that the components modelled in each scenario enable to operate according to the navigation relationships.

Image watermarking technique applying multiple encryption techniques (다중 암호화 기법을 적용한 영상 워터마킹 기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.503-510
    • /
    • 2020
  • In this paper, we proposed an effective technique that greatly improves the security of the watermark by concealing the multiple-encrypted watermark in the LSB of the image pixel. Even if multiple encrypted watermark hidden in the LSBs of an image pixel are extracted, it is impossible to decrypt them, so the security of the watermark is maintained very high. If the watermark is multiple encrypted and hidden in the image using the proposed technique, the visual quality of the watermark-hidden image is very high, making it impossible to distinguish between the original image and the resulting image in which the watermark is hidden. The original watermark data can be completely extracted without loss, according to the procedure of the proposed technique, from the resulting image that the watermark is encrypted and hidden in the original image. The performance of the proposed technique was analyzed mathematically and the superiority of the proposed technique was confirmed through experiments. The proposed technique is an excellent image watermarking technique that greatly improves the security of the watermark hidden in the image compared to the existing technique.