• Title/Summary/Keyword: passive control systems

Search Result 463, Processing Time 0.029 seconds

Overlay2 file system's Source Protection Methodology (Overlay2 파일 시스템의 소스 보호 방법에 관한 연구)

  • Han, Sung-Hwa
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1397-1402
    • /
    • 2021
  • The overlay2 file system is one of the union file systems that mounts multiple directories into one. The source directory used for this overlay2 file system mount has a characteristic that it operates independently of the write-able layer after mounting, so it is often used for container platforms for application delivery. However, the overlay2 file system has a security vulnerability that the write-able layer is also modified when file in the source directory is modified. In this study, I proposed the overlay2 file system protection technology to remove the security vulnerabilities of the overlay2 file system. As a result of empirically implementing the proposed overlay2 file system protection technology and verifying the function, the protection technology proposed in this study was verified to be effective. However, since the method proposed in this study is a passive protection method, a follow-up study is needed to automatically protect it at the operating system level.

An Implementation of Database Security Using Steganography in the Web (웹 상에서 스테가노그라피 기법을 이용한 안전한 데이터베이스 보안 구현)

  • Moon, Bong-Keun;Ryoo, Du-Gyu;Ko, Myung-Sun;Eom, Ki-Won;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.3-11
    • /
    • 2005
  • As the usage of Internet grows, we share many informations among the others and use more database systems for a various type of data. However, secure database system, which prevents the unauthorized users from modification, deletion, and access, is urgently required for sharing data in Internet. Conventional technologies of a data security are passive methods which depend on several steps with an access control, and these methods are vulnerable against the illegal attack because attacker can see the plain text that is private message. To prevent private data item for the special security from the malicious attack in web database, this paper is devoted to implement database system using steganography method, so we can protect the data item completely because attacker cannot know the secure message although he get the content of database.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Optimization Design of Damping Devices for a Super-Tall Building Using Computational Platform (전산플랫폼을 이용한 초고층구조물의 감쇠장치 최적화 설계)

  • Joung, Bo-Ra;Lee, Sang-Hyun;Chung, Lan;Choi, Hyun-Chul
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.28 no.2
    • /
    • pp.145-152
    • /
    • 2015
  • In the study, the effects of damping devices on damping ratio increase and wind-load reduction were investigated based on the computational platform, which is one of the parametric modeling methods. The computational platform helps the designers or engineers to evaluate the efficacy of the numerous alternative structural systems for irregular Super-Tall building, which is crucial in determining the capacity and the number of the supplemental damping devices for adding the required damping ratios to the building. The inherent damping ratio was estimated based on the related domestic and foreign researches conducted by using real wind-load records. Two types of damping devices were considered: One is inter-story installation type passive control devices and the other is mass type active control devices. The supplemental damping ratio due to the damping devices was calculated by means of equivalent static analysis using an equation suggested by FEMA. The optimal design of the damping devices was conducted by using the computational platform. The structural element quantity reduction effect resulting from the installation of the damping devices could be simply assessed by proposing a wind-load reduction factor, and the effectiveness of the proposed method was verified by a numerical example of a 455m high-rise building. The comparison between roof displacement and the story shear forces by the nonlinear time history analysis and the proposed method indicated that the proposed method could simply but approximately estimate the effects of the supplemental damping devices on the roof displacement and the member force reduction.

The Effects of Virtual Reality Advertisement on Consumer's Intention to Purchase: Focused on Rational and Emotional Responses (가상현실(Virtual Reality) 광고가 소비자 구매의도에 미치는 영향: 이성적인 반응과 감성적인 반응의 통합)

  • Cha, Jae-Yol;Im, Kun-Shin
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.101-124
    • /
    • 2009
  • According to Wikipedia, virtual reality (VR) is defined as a technology that allows a user to interact with a computer-simulated environment. Due to a rapid growth in information technology (IT), the cost of virtual reality has been decreasing while the utility of virtual reality advertisements has dramatically increased. Nevertheless, only a few studies have investigated the effects of virtual reality advertisement on consumer behaviors. Therefore, the objective of this study is to empirically examine the effects of virtual reality advertisement. Compared to traditional online advertisements, virtual reality advertisement enables consumers to experience products realistically over the Internet by providing high media richness, interactivity, and telepresence (Suh and Lee, 2005). Advertisements with high media richness facilitate consumers' understanding of advertised products by providing them with a large amount and a high variety of information on the products. Interactivity also provides consumers with a high level of control over the computer-simulated environment in terms of their abilities to adjust the information according to their individual interests and concerns and to be active rather than passive in their engagement with the information (Pimentel and Teixera, 1994). Through high media richness and interactivity, virtual reality advertisements can generate compelling feelings of "telepresence" (Suh and Lee, 2005). Telepresence is a sense of being there in an environment by means of a communication medium (Steuer, 1992). Virtual reality advertisements enable consumers to create a perceptual illusion of being present and highly engaged in a simulated environment, while they are in reality physically present in another place (Biocca, 1997). Based on the characteristics of virtual reality advertisements, a research model has been proposed to explain consumer responses to the virtual reality advertisements. The proposed model includes two dimensions of consumer responses. One dimension is consumers' rational response, which is based on the Information Processing Theory. Based on the Information Processing Theory, product knowledge and perceived risk are selected as antecedents of intention to purchase. The other dimension is emotional response of consumers, which is based on the Attitude-Structure Theory. Based on the Attitude-Structure Theory, arousal, flow, and positive affect are selected as antecedents of intention to purchase. Because it has been criticized to have investigated only one of the two dimensions of consumer response in prior studies, our research model has been built so as to incorporate both dimensions. Based on the Attitude-Structure Theory, we hypothesized the path of consumers' emotional responses to a virtual reality advertisement: (H1) Arousal by the virtual reality advertisement increases flow; (H2) Flow increases positive affect; and (H3) Positive affect increases intension to purchase. In addition, we hypothesized the path of consumers' rational responses to the virtual reality advertisement based on the Information Processing Theory: (H4) Increased product knowledge through the virtual reality advertisement decreases perceived risk; and (H5) Perceived risk decreases intension to purchase. Based on literature of flow, we additionally hypothesized the relationship between flow and product knowledge: (H6) Flow increases product knowledge. To test the hypotheses, we conducted a free simulation experiment [Fromkin and Streufert, 1976] with 300 people. Subjects were asked to use the virtual reality advertisement of a cellular phone on the Internet and then answer questions about the variables. To check whether subjects fully experienced the virtual reality advertisement, they were asked to answer a quiz about the virtual reality advertisement itself. Responses of 26 subjects were dropped because of their incomplete answers. Responses of 274 subjects were used to test the hypotheses. It was found that all of six hypotheses are accepted. In addition, we found that consumers' emotional response has stronger impact on their intention to purchase than their rational response does. This study sheds much light into practical implications for both IS researchers and managers. First of all, while most of previous research has analyzed only one of the customers' rational and emotional responses, we theoretically incorporated and empirically examined both of the two sides. Second, we empirically showed that mediators such as arousal, flow, positive affect, product knowledge, and perceived risk play an important role between virtual reality advertisement and customer's intention to purchase. In addition, the findings of this study can provide a basis of practical strategies for managers. It was found that consumers' emotional response is stronger than their rational response. This result indicates that advertisements using virtual reality should focus on the emotional side, and that virtual reality can be served as an appropriate advertisement tool for fancy products that require their online advertisements to give an impetus to customers' emotion. Finally, even if this study examined the effects of virtual reality advertisement of cellular phone, its findings could be applied to other products that are suited for virtual experience. However, this research has some limitations. We were unable to control different kinds of consumers and different attributes of products on consumers' intention to purchase. It is, therefore, deemed important for future research to control the consumer and product types for more reliable results. In addition to the consumer and product attributes, other variables could affect consumers' intention to purchase. Thus, the future research needs to find ways t control other variables.

Comparative Study on the Methodology of Motor Vehicle Emission Calculation by Using Real-Time Traffic Volume in the Kangnam-Gu (자동차 대기오염물질 산정 방법론 설정에 관한 비교 연구 (강남구의 실시간 교통량 자료를 이용하여))

  • 박성규;김신도;이영인
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.4
    • /
    • pp.35-47
    • /
    • 2001
  • Traffic represents one of the largest sources of primary air pollutants in urban area. As a consequence. numerous abatement strategies are being pursued to decrease the ambient concentration of pollutants. A characteristic of most of the these strategies is a requirement for accurate data on both the quantity and spatial distribution of emissions to air in the form of an atmospheric emission inventory database. In the case of traffic pollution, such an inventory must be compiled using activity statistics and emission factors for vehicle types. The majority of inventories are compiled using passive data from either surveys or transportation models and by their very nature tend to be out-of-date by the time they are compiled. The study of current trends are towards integrating urban traffic control systems and assessments of the environmental effects of motor vehicles. In this study, a methodology of motor vehicle emission calculation by using real-time traffic data was studied. A methodology for estimating emissions of CO at a test area in Seoul. Traffic data, which are required on a street-by-street basis, is obtained from induction loops of traffic control system. It was calculated speed-related mass of CO emission from traffic tail pipe of data from traffic system, and parameters are considered, volume, composition, average velocity, link length. And, the result was compared with that of a method of emission calculation by VKT(Vehicle Kilometer Travelled) of vehicles of category.

  • PDF

Analysis of the Dynamic Characteristics on Aerodynamic Loads of Wind Turbine Blade with New Airfoil KA2 (신규 익형 KA2가 적용된 풍력 블레이드의 공력 하중에 대한 동특성 해석)

  • Kang, Sang-Kyun;Lee, Ji-Hyun;Lee, Jang-Ho
    • The KSFM Journal of Fluid Machinery
    • /
    • v.18 no.6
    • /
    • pp.63-70
    • /
    • 2015
  • This paper proposes a novel airfoil named "KA2" for the blade of the wind turbine systems. Dynamic loads characteristics are analyzed and compared using aerodynamic data of ten airfoils including the proposed airfoil. The blade is divided into the sixteen elements in the longitudinal direction of the blade for applying the Blade Element Method Theory (BEMT) method, and in each element, torque, thrust, and pitching moment are calculated using turbulent time varying wind speed and aerodynamic data of each wing. Additionally, each force and torque is accumulated in the whole region of the blade for the estimation of representative values. The magnitude of such forces is comparatively analyzed for different airfoils. The angle of attack is constant below the rated wind speed due to the fact that the tip speed ratio is kept at the constant value, and it increases in the region of over rated wind speed as the tip speed ratio decreasing with constant rated rpm and increasing wind speed. Such increase in the angle of attack causes the changes of the force acting on the airfoil with different characteristics of lift and drag in the stall region of each different airfoil. Even though the mean wind speed is in the rated speed in a given time, because of the turbulence, it has either the over rated or under rated speed most of the time. Furthermore, the dynamic properties of each force are analyzed in this rated wind speed in order to objectively understand the dynamic properties of the blades which are designed based on the different airfoils. These dynamic properties are also compared by the standard deviation of time varying characteristics. Moreover, the output characteristics of the wind turbine are investigated with different airfoils and wind speeds. Based on these investigations, it was revealed that the proposed airfoil (KA2) is well applicable to the blade with passive pitch control system.

(A) Study on the Structure Change of Financial Industrial for strengthening Global Financial Control (글로벌 금융 규제 강화에 따른 금융산업의 구조변화에 대한 연구)

  • Ham, Hyung-Bum;Choi, Chang-Youl
    • International Commerce and Information Review
    • /
    • v.16 no.2
    • /
    • pp.47-67
    • /
    • 2014
  • Since the global financial crisis, criticism against the integrity of financial institutions proposed new financial regulations such as Basel III. These systems are expected to have impacts multilaterally on management and structure of mid- and long-term financial industry. It is also believed that financial institutions will inevitably review business model to respond to these enhanced regulations. The ongoing global financial regulation pursues regulation scope extension, introduction of global regulatory capital system, introduction of global liquidity, etc. As for quantitative index, Basel Committee on Banking Supervision is promoting QIS which is discussed mainly on implementation time from the juridical point of view. This study aims to present domestic banking industry's structural changes depending on regulation enhancement of foreign countries after global financial crisis, and suggest strategy that improves competitiveness of products. Looking at the research result, global financial regulation requires compliance with the regulations through treaties but it shows negative time center around banks. Furthermore, it is also pointed out financially advanced countries' passive attitude on regulation enhancement is problem. Therefore, regulations differentiated between developing and developed countries, dualistic regulations on financial industry, participation of advanced nations, etc are the postulation to change the structure of financial industry.

  • PDF

Improvement of Seismic Performance of Long-span Bridges using Complex Dampers (복합감쇠기를 이용한 장대교량의 내진성능향상)

  • Ha, Dong-Ho;Park, Kwan-Soon;Park, Won-Suk;Pyeon, Mu-Wook
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.11 no.3 s.55
    • /
    • pp.53-62
    • /
    • 2007
  • This paper presents a new vibration control method for long-span bridges using complex damper system. The new system presents simple mechanical configuration with oil and elasto-plastic dampers which have velocity and displacement dependency in vibration energy absorbing. This system can produce various damping forces according to the applied external forces by the velocity and displacement-dependent characteristics of the dampers. The oil damper dissipates vibration energy for relatively frequent and small amplitude like in the case for small to moderate earthquakes, whereas the elasto-plastic damper system works for rare and large amplitude vibration such as high seismic excitation. Thus, the proposed system exhibits the advantage of low cost with high performance since the roles of the two different dampers are effectively separated. A numerical model is established for the complex damper system, and the response characteristics and effectiveness of the proposed system are presented through numerical simulations. Numerical results show that the proposed complex damper system can significantly improve the seismic performance of long-span bridge structures with much more effective damping mechanism than single conventional passive damper systems.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.