• Title/Summary/Keyword: normal logging

Search Result 18, Processing Time 0.02 seconds

In-Situ Measurement of Chiller Performance and Thermal Storage Density of an Ice Thermal Storage System (빙축열 시스템 냉동기 성능 및 축열밀도 현장측정 기법연구)

  • Shin Younggy;Yang Hooncheul;Tae Choon-Seob;Cho Soo;Kim Youngil
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.17 no.12
    • /
    • pp.1204-1209
    • /
    • 2005
  • In-situ measurement was made to evaluate chiller performance and thermal storage density of an ice thermal storage system. The system belonged to a big hotel and the measurement was conducted during late October. Owing to very small cooling load, the data logging was possible for a single thermal storage cycle. However, operation history of the chiller showed a relatively good spectrum of data for performance evaluation. COP and thermal storage density were calculated. The COP at full load was about 4.07, which was lower than $4.8\~6.4$ of new chillers. The measured storage density was about $10.9RT-h/m^3\;(=152MJ/m^3)$, which also was lower than a criterion of normal performance $(above\;13.0RT-h/m^3\;or\;181MJ/m^3)$. The study result provides technical basis for quantitative ESCO business scenario.

Detection of Car Hacking Using One Class Classifier (단일 클래스 분류기를 사용한 차량 해킹 탐지)

  • Seo, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.33-38
    • /
    • 2018
  • In this study, we try to detect new attacks for vehicle by learning only one class. We use Car-Hacking dataset, an intrusion detection dataset, which is used to evaluate classification performance. The dataset are created by logging CAN (Controller Area Network) traffic through OBD-II port from a real vehicle. The dataset have four attack types. One class classification is one of unsupervised learning methods that classifies attack class by learning only normal class. When using unsupervised learning, it difficult to achieve high efficiency because it does not use negative instances for learning. However, unsupervised learning has the advantage for classifying unlabeled data, which are new attacks. In this study, we use one class classifier to detect new attacks that are difficult to detect using signature-based rules on network intrusion detection system. The proposed method suggests a combination of parameters that detect all new attacks and show efficient classification performance for normal dataset.

Groundwater Flow Characterization in the Vicinity of the Underground Caverns by Groundwater Level Changes (지하수위 변화에 따른 지하공동 주변의 지하수 유동특성 해석)

  • 강재기;양형식;김경수;김천수
    • Tunnel and Underground Space
    • /
    • v.13 no.6
    • /
    • pp.465-475
    • /
    • 2003
  • Groundwater inflow into the caverns constructed in fractured rock mass was simulated by numerical modeling, NAPSAC (DFN, discrete fracture network model) and NAMMU (CPM, continuous porous media model), a finite-element software package for groundwater flow in 3D fractured media developed by AEA Technology, UK. The input parameters for modeling were determined on surface fracture survey, core logging and single hole hydraulic test data. In order to predict the groundwater inflow more accurately, the anisotropic hydraulic conductivity was considered. The anisotropic hydraulic conductivities were calculated from the fracture network properties. With a minor adjustment during model calibration, the numerical modeling is able to reproduce reasonably groundwater inflows into cavern and the travel length and times to the ground surface along the flow paths in the normal, dry and rainy seasons.

Analysis of Security Vulnerability on Firewall Logging Mechanism against DDoS Attack (DDoS 공격에 대한 방화벽 로그 기록 취약점 분석)

  • Choun, Jun-Ho;Jang, Kun-Won;Jun, Moon-Seog;Shin, Dong-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.143-148
    • /
    • 2007
  • In the context of mass traffic, firewall system cannot record normal log files against DDoS attack. The loss of log record causes that a firewall system does not know whether a packet is normally filtered or not, and firewall log, which is an essential data for the counter measure of violation accident, cannot be verified as trusted. As a network speed increases, these problems happen more frequently and largely. Accordingly, the method to use simply additional hardware devices is not recommended for the popularization of firewall. This paper is devoted to verify the loss of iptable log that is the mother's womb of most domestic firewall systems and show that the log handling methods for conventional firewall systems are needed to improve.

Research on Efficient Live Evidence Analysis System Based on User Activity Using Android Logging System (안드로이드 로그 시스템을 이용한 효율적인 사용자 행위기반 라이브 증거수집 및 분석 시스템 연구)

  • Hong, Il-Young;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.67-80
    • /
    • 2012
  • Recently as the number of smartphone user is growing rapidly, android is also getting more interest in digital forensic. However, there is not enough research on digital data acquisition and analysis based on android platform's unique characteristics so far. Android system stores all the related recent systemwide logs from the system components to applications in volatile memory, and therefore, the logs can potentially serve as important evidences. In this paper, we propose a digital data acquisition and analysis system for android which extracts meaningful information based on the correlation of android logs and user activities from a device at runtime. We also present an efficient search scheme to facilitate realtime analysis on site. Finally, we demonstrate how the proposed system can be used to reconstruct the sequence of user activities in a more intuitive manner, and show that the proposed search scheme can reduce overall search and analysis time approximately 10 times shorter than the normal regular search method.

Pole-pole array electrical resistivity survey and an effective interpretational scheme of its data (2극법 전기비저항 탐사 자료의 효율적인 해석방법)

  • Cho Dong-Heng;Lee Chang Yourl;Jee Sang-Keun
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2000.09a
    • /
    • pp.112-131
    • /
    • 2000
  • In spite of its many strong points, pole-pole electrode configuration is not often used for ground electrical resistivity survey except for bore hole survey as normal logging and for archaeological investigation. Above all, poor spatial resolution of pole-pole survey may be responsible for this. But recent experiences so far gained by the present authers lead them to think that pole-pole survey can be at least a viable means of reconnaissance survey in near-surface conductive environment and an effective interpretational scheme may augment its resolution. As well known, a response of any other electrode configuration is a linear combination of pole-pole responses. Based on this principle of linear superposition and the principle of reciprocity, the other 'responses' can be derived with simple additions and subtractions of pole-pole responses. Though such responses are not always correct due to the adverse effects of noises, combined with the potential decay curves, they can be helpful to interprete better pole-pole survey data especially in connection of the resolution. This can be comparable to the use of the first or second derivatives of gravity and magnetic intensity surveys.

  • PDF

Development of the Semi-Crawler Type Mini-Forwarder - Design and Manufacture - (반궤도식 산림작업차 개발(I) - 설계 및 제작 -)

  • Kim, Jae-Hwan;Park, Sang-Jun
    • Journal of Korean Society of Forest Science
    • /
    • v.100 no.2
    • /
    • pp.154-164
    • /
    • 2011
  • This study was conducted to develop the semi-crawler type mini-forwarder that can be operated comfortable small-scale logging operation in the steep terrain and also used at a variety of operations such as the civil work in erosion control and forest-road. Considering the minimum turning radius and the width of forest operation road, the total length, width and loading capacity of the semi-crawler type mini-forwarder is 5,750 mm, 1,900 mm and $2.5m^{3}$, respectively. The maximum engine power is 96ps at 3600 rpm. Selected hydraulic pumps are consists of two main pumps and two sub-main pumps. Main hydraulic pumps are utilized to running motor of the front wheel and rear crawler. Sub-main pumps are utilized to the actuation parts such as steering, crane, out-rigger and dump cylinder. The transmission was adapted as the HST (Hydro-Static Transmission) system. The driving parts are designed and manufactured as the front wheel type and the rear crawler type. The steering type was manufactured as the ackerman type. Driving control parts type was designed and manufactured as driver's seat type of normal cars. It is also attached on auxiliary equipments such as winch, log grapple and out-rigger. The traveling speed of the semi-crawler type mini-forwarder in forest road was 5.3 km/hr to 7.7 km/hr.

A Study on the Development of IoT Inspection System for Gas Leakage Inspection in Kitchen Gas Range Built-in Method (주방 가스레인지 빌트인 방식에서 가스 누출검사를 위한 IoT 검사 시스템 개발에 관한 연구)

  • Kang, Dae Guk;Choi, Young Gyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.283-290
    • /
    • 2022
  • In this study, an IoT inspection system that can be linked with a server was developed using a gas timer and ESP-01 Wi-Fi module installed on a gas valve in the home. The server environment of the gas leak IoT inspection system was installed with APM (Apache, PHP, MySQL) to collect gas pressure data by generation so that leakage checks could be performed. In order to control the gas leak IoT inspection system, the app inventory was used to manage the gas leak check value in real time. In addition, user convenience has been enhanced so that membership management, WiFi settings, and leakage check values can be checked through mobile apps. In order to manage subscribers by region, the user list was checked by logging in in in the administrator mode so that the information on whether or not the leak test was conducted and the results could be provided. In addition, when the user presses the gas leak check button, the pressure is automatically checked, and the measured value is stored in the server, and when a gas leak occurs, the leakage check is performed after alarm and repair so that it can be used if normal. In addition, in order to prevent overlapping membership, membership management can be performed based on MAC addresses.