• Title/Summary/Keyword: protect system

Search Result 2,519, Processing Time 0.029 seconds

Study on tunnel geometry protecting a propeller using potential based panel method (포텐셜 기저 패널법에 의한 프로펠러 보호터널의 형상변화에 관한 연구)

  • Suh, Sung-Bu
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.31 no.5
    • /
    • pp.614-621
    • /
    • 2007
  • The fishing boat propulsion system employing the modified stern shape and the tunnel to protect a propeller is developed to increase the cruise speed and reduce he problem resulting from the open propeller accidentally catching the waste net and able on the sea. Using 3 different tunnel types, the model test was performed in the circular water channel and the panel method based on the potential theory is applied to analyze the open water performance of the propeller. In the numerical analysis using he potential-based panel method, it calculates the hydrodynamic interaction between the propeller and the tunnel and evaluates the effect of the tunnel geometry. From the numerical and experimental results differing tunnel geometries, the propulsion efficiency is increased by the larger diameter of the inlet than the outlet of the tunnel and the smaller gap between the propeller tip and the tunnel internal surface. These results provide the information of the propeller system with the tunnel and the hydrodynamic interaction between the propeller and the tunnel.

The Secure Hybrid Authentication message protocol (안전한 하이브리드 인증 메시지 프로토콜)

  • Yang, Hyung-Kyu;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.77-85
    • /
    • 2007
  • Asecure channel provides protection against interception, while an authentication system is created to protect the client and the server from fabrication attacks. This paper proposes a hybrid authentication algorithm, which fixes the lapses problem encountered in the SSL authentication. Also, the Proposed hybrid authentication system has been created to protect the client and the server from modification and fabrication attacks. By using a modified three-way authentication there is no need for a timeserver. thus timestamps are not needed.

  • PDF

A Study on the Motor Overload Protection Device (모터 과부하 차단장치에 대한 연구)

  • Kang Byeong Bog;Lim Jung Yeol;Cha In Su;Cho Kyeong Jai;Yoon Suk Am;Lee Jung Il;Seo Jang Soo
    • Proceedings of the KIPE Conference
    • /
    • 2002.11a
    • /
    • pp.209-212
    • /
    • 2002
  • In electrical machinery and apparatus, the most important problem is protect of machinery and apparatus in duo to transient phenomena and overload on operation. Particularly by advanced technology of late, there is demand for low cost of equipments and high percentage of use of equipments. Therefore, protection of machinery and apparatus in condition of overload is more valued considering that all efficiency increase is passed by operating all machinery and apparatus in condition of heavyload. In this paper, the suggested system is add overload protect system using CT in condition of overload.

  • PDF

A Method to Protect the Information of Tag Using Forced Collision Mechanism in RFID System (RFID 시스템에서 강제 충돌을 이용한 태그 정보 보호 기법)

  • Park Ju-Sung;Kang Jeonil;Nyang Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.25-33
    • /
    • 2005
  • We propose a method to protect the tag's information from illegal reader in RFID system. In this method, a special tag called ownership tag makes intentionally collisions during singulation. By the forced collision of an ownership tag a reader can obtain the information of ordinary tags. Whereas a reader can not find my information on tag's ID without the ownership tag.

Understanding the commercial significance of geographical indications and the implications for Korean kimchi through the example of Columbian coffee (콜롬비아 커피의 지리적 표시 활용 전략을 통해 본 지리적 표시의 상업적 의의와 김치의 지리적 표시제 개선 방향)

  • Song, YoungJoo
    • Food Science and Industry
    • /
    • v.54 no.4
    • /
    • pp.268-277
    • /
    • 2021
  • A geographical indication (GI) is a sign used on products that have a specific geographical origin and possess qualities or a reputation that are due to that origin. This paper explores ways to protect Korean goods as GIs in the U.S. and EU by examining the efforts of the Colombian Coffee Federation (FNC) to protect Colombian coffee. The FNC enhanced the global awareness of Colombian coffee and increased the profits of Colombian coffee producers by registering Colombian coffee as a certification mark in the U.S. and as a GI under the EU's quality schemes. The Korean government protects kimchi under its own GI system. For kimchi products to earn the label "Korean kimchi," the three main ingredients must be produced in Korea. This has been a challenge for kimchi producers, who often rely on imported ingredients. Korea could learn from FNC's strategies to improve the current GI system for kimchi.

System Dynamics Modeling for Management of Roe Deer Population in Jejudo (제주도 한라산 노루 적정 개체수에 관한 시스템 다이내믹스 모델링)

  • Kim, Doa-Hoon;Hong, Young-Kyo
    • Korean System Dynamics Review
    • /
    • v.9 no.2
    • /
    • pp.45-75
    • /
    • 2008
  • Roe Deer has been preserved for 25 years by the local government and the residents in Jejudo. However, the damage and harm of crops of the residents by Roe Deer are increasing as well. So, some experts worry about the unstability of ecosystem in Mt. Halla where Roe Deer live. This paper discuss the suitable number of Roe Deer population in Jejudo to protect the ecosystem in Mt. Halla and minimize the damage of residents in Jejudo. With system dynamics modeling and simulation, the population of Roe Deer at present is estimated about 2,300. However, the population of Roe Deer stays 'unstable balance'. So, a little change such as poaching and the increase of wild dogs may make the balance of ecosystem broken. According to the result of policy test simulation, we should keep on watching the poaching and maintain the number of wild dogs at about 100, so that the ecosystem in Jejudo can be stable. To reduce the moving of Roe Deer to low region, moreover, we should protect the Mt. Halla which is Roe Deer's habitat. If we are indifferent about these efforts, the ecosystem of Roe Deer in Mt. Halla will be ruined.

  • PDF

A Study of XrML-based Rights Business Model for Digital Contents Copyright Administration (디지털 컨텐츠 저작권 관리를 위한 XrML 기반의 저작권 비즈니스 모델에 관한 연구)

  • 최지훈;유윤식;임산송;김진수;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.289-292
    • /
    • 2003
  • Digitalized multimedia contents is changing active digital contents in form passed from manufacturer directly to consumer though digital network of high speed, also face with big problem that is protection of rights to protect digital contents, to protect those and effort to active digital contents process height. Also, in situation that require change to more efficient system, the efficiency of rights document that is basic intermediate to be used in business of digital contents field is emphasized. Therefore, the design of common business model to share contents that have same purpose without depending on specific system to offer contents with another system is required. This paper designed adaptable rights business model to general digital contents, and designed and implemented rights document editing system to editable document for Right management according to designed business model.

  • PDF

System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection (Windows 기반의 PC 보안 정책 관리 및 취약성 점검을 위한 시스템 설계 및 구현)

  • Park, Byung-Yeon;Yang, Jong-Won;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.23-30
    • /
    • 2008
  • Attempt to protect personal computer from hacking, virus, worm, and the troy wooden horse is progressed variously. Nevertheless, it is very difficult fer public users to understand configurations to enhance security stability in windows based personal computer, and many security problem is due to there lack of recognize about information accessability, various kind of configuration, these necessity, and efficiency. Accordingly, it is demandded to develop an efficient system to protect networks and personal computer with automated method. In this paper, we derive problems of personal computer by analyzing various vulnerableness and policy on security, through which we design and implement the system to solve various windows system problem conveniently.

A study on approach thesis of protection martial arts (경호기법에 입각한 경호무도의 학문적 접근)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.103-122
    • /
    • 2003
  • Protection sciences are new science. therefore, protection martial arts sciences are will studied be based on study of protection in order to supply high level by request. Moreover, It is reconstruction that protection martial arts masters education, systematic manage, certificate system, protection martial arts recognition certificate, protection martial arts equipment, practice of protection martial arts. Protection martial arts occurs on the unforeseen accident and body guarding, therefore martial arts concept of protection martial arts different general martial arts and sport. In order to develope of protection martial arts First, scientific thesis need of protection martial arts learning. Especially, aims of present protection martial arts is not protect oneself, protect the VIP to safely from all dangers is different thing with aims of general martial arts. Instinct that VIP protect rather than oneself should study and develop. Second, techniques and model of protection martial arts spread to who in connection with security service by systematic and organized. Preferentially, study of protection martial arts Techniques and model possible the protection martial arts learned society, found laboratory and endowed protection martial arts society organize and prevention for random of protection martial arts and must make the original protection martial arts. Third, protection martial arts official certificate and license system must organize in order to training and manage of protection martial art master, Match director(First Second), life physical director(First, Second, Third) is systematically manage by Ministry of Culture & Tourism Republic of Korea. Like this protection martial arts also classify the certificate by scholarship and experience. Fourth, In union to university, private security service company, public institution, police and system that possible leaning to protection martial arts certificate course important. In addition, destroy the commercial character of present martial arts and cultivate the pure martial arts mind, should develop to martial arts in order to improve the humanism and temperament of right body guard.

  • PDF

The Effects of Scope Management on Process Performance and Output Performance in the Information System Development Project : An Analysis from Project Supplier's Perspective (공급자 관점에서 정보시스템 개발 프로젝트의 범위관리활동이 프로세스성과와 결과물성과에 미치는 영향에 대한 연구)

  • Park, Bong-Gu;Lim, Gyoo-Gun;Yoo, Weon-Sang
    • Journal of Information Technology Services
    • /
    • v.8 no.3
    • /
    • pp.83-100
    • /
    • 2009
  • Even though the success of the information system (IS) protect becomes a critical issue to an enterprise and there has been a lot of research about finding critical success factors of IS projects, the scope management for the success of IS protect has received little attention in the literature. The purpose of this research is to investigate the effects of the project scope management activities defined by PMI (Project Management Institute) on the performance of the information system project. The focus of this paper is on the project supplier's point of view. This study shows the priority of the scope management activities during the IS Project. The results show the different results depending on the types of the project clients and the project scale. This research reveals that the scope verification is important for the project supplier from the project process view, and that the scope planning/definition is important for the protect client from the project result view. It also shows different results comparing to the conventional recognition about project success. The research results show that the positive relationships between the project scale and the importance of scope management activities, and between the familiarity of suppliers and clients and the importance of the scope management activities. Through this research, we expect that the importance of the scope management in a project will be considered as an important issue, and that this research will lead to various detailed research about this issue.