• Title/Summary/Keyword: 기술코드

Search Result 2,228, Processing Time 0.04 seconds

A method of wall absorption treatment for enhancing the speech intelligibility at a directional microphone array in a room (실내 공간 내 지향성 마이크 어레이에서의 음성 명료도 개선을 위한 벽면 흡음 처리 방법)

  • Ko, Byeong-Yun;Ih, Jeong-Guon;Cho, Wan-Ho
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.6
    • /
    • pp.649-659
    • /
    • 2021
  • Wall absorption treatment effectively reduces reverberation, but requires a large area for a live room and each wall absorption affects speech intelligibility differently. In this study, we try to find the most effective wall for the absorption treatment using the beamforming array microphone in terms of speech intelligibility. The absorption importance factor is defined by using the collision number of reflected sounds on each wall. It allows estimating how much the speech signal will be enhanced by the absorption treatment. A cuboid room with a size of 107 m3 and a reverberation time of 1.1 s is selected for the simulation. When a Helmholtz-type absorption is treated on the wall with the most significant importance factor, the modified clarity for 500 and 1k Hz is improved by 5.1 dB and 4.8 dB respectively, and the speech transmission index is enhanced by 0.06. The difference in results between the proposed method and commercial simulation code is less than a Just-Noticeable Difference (JND). The absorption treatment on the wall with the most significant importance factor shows improvement greater than the wall with the largest area, and its difference is larger than a JND value.

A Study on the Development of Intravenous Injection Management Application for EMR System Interworking (EMR 시스템 연동 정맥주사 관리 애플리케이션 개발에 대한 연구)

  • Jin-Hyoung, Jeong;Jae-Hyun, Jo;Seung-Hun, Kim;Won-yeop, Park;Sang-Sik, Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.6
    • /
    • pp.506-514
    • /
    • 2022
  • This paper is about developing an intravenous injection management system that can provide nurses with information related to intravenous injection in real-time to compensate for possible instability factors during intravenous injection. The intravenous injection management system consists of an app-based user S/W and a web-based administrator S/W. User S/W is implemented to provide users with the ability to identify patients who need intravenous injection through smartphones, tablet PCs, and nursing PDAs, recognize information codes given to patients, and enter and share treatment contents and treatment items after intravenous injection. As a result of intravenous injection treatment uploaded through the user app, the manager S/W can check the records of intravenous injection treatment items, perform user management functions, emergency notification registration and management functions, and data upload functions. The implemented system has not yet been tested on the EMR system used in the actual hospital. Therefore, through further research, S/W will be optimized and actual environmental application tests will be conducted through cooperation with hospitals.

A Forensic Methodology for Detecting Image Manipulations (이미지 조작 탐지를 위한 포렌식 방법론)

  • Jiwon Lee;Seungjae Jeon;Yunji Park;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.671-685
    • /
    • 2023
  • By applying artificial intelligence to image editing technology, it has become possible to generate high-quality images with minimal traces of manipulation. However, since these technologies can be misused for criminal activities such as dissemination of false information, destruction of evidence, and denial of facts, it is crucial to implement strong countermeasures. In this study, image file and mobile forensic artifacts analysis were conducted for detecting image manipulation. Image file analysis involves parsing the metadata of manipulated images and comparing them with a Reference DB to detect manipulation. The Reference DB is a database that collects manipulation-related traces left in image metadata, which serves as a criterion for detecting image manipulation. In the mobile forensic artifacts analysis, packages related to image editing tools were extracted and analyzed to aid the detection of image manipulation. The proposed methodology overcomes the limitations of existing graphic feature-based analysis and combines with image processing techniques, providing the advantage of reducing false positives. The research results demonstrate the significant role of such methodology in digital forensic investigation and analysis. Additionally, We provide the code for parsing image metadata and the Reference DB along with the dataset of manipulated images, aiming to contribute to related research.

Cataloging Trends after LRM and its Acceptance in KORMARC Bibliographic Format (LRM 이후 목록 동향과 KORMARC 통합서지용에서의 수용 방안)

  • Lee, Mihwa;Lee, Eun-Ju;Rho, Jee-Hyun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.25-45
    • /
    • 2022
  • This study was to develop KORMARC-bibliographic format reflecting cataloging trends after LRM using literature review, analysis of MARC 21 discussion papers, and comparison of the fields in MARC 21 and KORMARC. The acceptance and consideration of fields and sub-fields that need to be revised in KORMARC are as follows. First, in terms of LRM / RDA, fields 381 or 387 for the representative expression, field 881 and the change and addition of its sub-fields for the manifestation statement, and data provenance code to ▾7 sub-field for date provenance may be considered. Second, in terms of Linked Data, ▾1 sub-field for RWO, and field 758 for related work identifier can be added. Third, for the data exchange of KORMARC and BIBFRAME, it should be developed in consideration of mapping with BIBFRAME classes and attributes in KORMARC. Fourth, additional fields such as 251 version information, 334 mode of issuance, 335 expansion plan, 341 accessibility content, 348 format of notated music, 353 supplementary content characteristics, 532 accessibility note, 370 associated place, 385 audience characteristics, 386 creator/contributor characteristics, 388 time period of creation, 688 subject added entry-type of entity unspecified, 884 description conversion information, 885 matching information could be developed. This study will be used to revise KORMARC-bibliographic format and to build and utilize bibliographic data in domestic libraries.

Numerical Analysis of Collapse Behavior in Industrial Stack Explosive Demolition (산업용 연돌 발파해체에서 붕괴거동에 관한 수치해석적 연구)

  • Pu-Reun Jeon;Gyeong-Jo Min;Daisuke Fukuda;Hoon Park;Chul-Gi Suk;Tae-Hyeob Song;Kyong-Pil Jang;Sang-Ho Cho
    • Explosives and Blasting
    • /
    • v.41 no.3
    • /
    • pp.62-72
    • /
    • 2023
  • The aging of plant structures due to industrialization in the 1970s has increased the demand for blast demolition. While blasting can reduce exposure to environmental pollution by shortening the demolition period, improper blasting design and construction plans pose significant safety risks. Thus, it is vital to consider optimal blasting demolition conditions and other factors through collapse behavior simulation. This study utilizes a 3-D combined finite-discrete element method (FDEM) code-based 3-D DFPA to simulate the collapse of a chimney structure in a thermal power plant in Seocheon, South Korea. The collapse behavior from the numerical simulation is compared to the actual structure collapse, and the numerical simulation result presents good agreement with the actual building demolition. Additionally, various numerical simulations have been conducted on the chimney models to analyze the impact of the duct size in the pre-weakening area. The no-duct, duct, and double-area duct models were compared in terms of crack pattern and history of Z-axis displacement. The findings show that the elapse-time for demolition decreases as the area of the duct increases, causing collapse to occur quickly by increasing the load-bearing area.

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.

Development of Algorithm for Vibration Analysis Automation of Rotating Equipments Based on ISO 20816 (ISO 20816 기반 회전기기 진동분석 자동화 알고리즘 개발)

  • JaeWoong Lee;Ugiyeon Lee;Jeongseok Oh
    • Journal of the Korean Institute of Gas
    • /
    • v.28 no.2
    • /
    • pp.93-104
    • /
    • 2024
  • Facility diagnosis is essential for the smooth operation and life extension of rotating equipment used in industrial sites. Compared to other diagnostic methods, vibration diagnosis can find most of the initial defects, such as unbalance, alignment failure, bearing defects and resonance, compared to other diagnostic methods. Therefore, vibration analysis is the most commonly used facility diagnosis method in industrial sites, and is usefully used as a predictive preservation (PdM) technology to manage the condition of the facility. However, since the vibration diagnosis method is performed based on experience based on the standard, it is carried out by experts. Therefore, it is intended to contribute to the reliability of the facility by establishing a system that anyone can easily judge defects by establishing a vibration diagnosis method performed based on experience as a knowledgeable code system. An algorithm was developed based on the ISO-20816 standard for vibration measurement, and the reliability was verified by comparing the results of vibration measurement at various demonstration sites such as petrochemical plant compressors, hydrogen charging stations, and industrial machinery with the results of analysis using a development system. The developed algorithm can contribute to predictive maintenance (PdM) technology that anyone can diagnose the condition of the rotating machine at industrial sites and identify defects early to replace parts at the exact time of replacement. Furthermore, it is expected that it will contribute to reducing maintenance costs and downtime due to the failure of rotating machines when applied to various industrial sites such as oil refining facilities, transportation, production facilities, and aviation facilities.

Evaluation method for interoperability of weapon systems applying natural language processing techniques (자연어처리 기법을 적용한 무기체계의 상호운용성 평가방법)

  • Yong-Gyun Kim;Dong-Hyen Lee
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.3
    • /
    • pp.8-17
    • /
    • 2023
  • The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.

  • PDF

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

핵융합로용 플라즈마 대향부품 개발을 위해 제작된 텅스텐/FM강 HIP 접합 목업의 수명 평가 해석

  • Lee, Dong-Won;Sin, Gyu-In;Kim, Seok-Gwon;Jin, Hyeong-Gon;Lee, Eo-Hwak;Yun, Jae-Seong;Mun, Se-Yeon;Hong, Bong-Geun
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2014.02a
    • /
    • pp.452-452
    • /
    • 2014
  • 블랑켓 일차벽이나 디버터와 같은 핵융합로 플라즈마 대향부품은 플라즈마로부터 입사되는 중성자 및 입자들을 차폐하여 구조물을 보호하고, 발생열을 에너지로 변환하기 위해 냉각재를 활용한 열제거 기능을 담당한다. 특히, 고속중성자와 입사 열부하 및 여러 입자들로부터 블랑켓 및 내부 구조물을 보호하기 위해 차폐체와 구조물로 구성된다. 세계적으로 차폐체로서는 텅스텐 혹은 텅스텐 합금, 구조물용 재료로는 저방사화 Ferritic Martensitic (FM) 강이 유력한 후보재료로 개발, 연구 중에 있다. 국내에서는 국제핵융합로(ITER) 사업을 통해 고온등방가압(HIP, Hot Isostatic Pressing)을 이용한 이종금속간 접합기술과 한국형 저방사화 고온구조재료인 ARAA (Advanced Reduced Activation Alloy)가 개발되고 있으며, 이를 활용한 설계, 접합법 개발, 제작목업의 건전성 평가 등이 수행되고 있다. 한국원자력연구원에서는 핵융합 기초사업의 일환으로 전북대와 공동으로 수행 중인 건전성 평가체계 개발을 위해, 기 개발된 접합법을 활용한 $45mm(H){\times}45mm(W){\times}2mm(T)$의 W/FM강 목업을 제작한 바 있으며, 이를 국내 구축된 고열부하 시험 장비인 KoHLT-EB (Electron Beam)를 활용한 고열부하 인가 건전성 평가시험을 준비 중에 있다. 이종금속간 접합 특성은 기계적 평가를 위한 파괴시험을 통해 검증, 이를 활용한 목업이 제작되었으며, 제작된 목업에 대한 초음파를 이용한 접합면의 비파괴 검사를 통해 결함이 없음을 확인하였다. 최종적으로 실제 사용되는 핵융합 운전조건과 유사 혹은 가혹한 조건에서 고열부하를 인가하여, 그 건전성을 평가가 이루어질 것이다. 고열부하 시험을 위해서는 냉각조건, 인가 열부하, 수명평가를 통한 반복 고열부하 인가 횟수 등이 사전에 결정되어야 한다. 이를 위해 상업용 열수력, 구조해석 코드인 ANSYS-CFX와 -mechanical을 이용한 시험조건 모의 및 수명 평가가 수행되었다. 구축 장비의 냉각계통을 고려하여 냉각수의 온도 및 속도는 $25^{\circ}C$, 0.15 kg/sec로, 열부하는 0.5 및 $1.0MW/m^2$에 대해 모의를 수행하였다. 정상상태 시 텅스텐의 최대 온도는 각 열부하 조건에 따라 $285.3^{\circ}C$$546.8^{\circ}C$였으며, 이에 도달하는 시간을 구하기 위해 천이해석을 수행하였고, 이를 통해 30초에 최대온도 95 %이상의 정상상태 온도에 도달함을 확인하였다. 또한, 목업의 초기 온도에 도달하는 냉각시간도 동일한 천이해석을 통해 30초로 가능함을 확인하였고, 최종 시험 조건을 30초 가열, 30초 냉각으로 결정하였다. 결정된 반복 열부하 인가 조건에서 이종금속 접합체가 받는 다른 열팽창 정도에 따른 응력을 계산하여 목업의 수명을 도출하였고, 이를 시험해야 할 반복 횟수로 결정하였다. 각 열부하 조건에 따른 온도조건을 ANSYS-mechanical 코드를 활용하여 열팽창과 이에 따른 접합면의 응력분포로 계산하였다. 0.5 및 $1.0MW/m^2$에 대해, 목업이 받는 최대 응력은 334.3 MPa와 588.0 MPa 였으며, 이 때 텅스텐과 FM강이 받는 strain을 도출하여 물성치로 알려진 cycle to failure 값을 도출하였다. 열부하에서 예상되는 수명은 0.5 및 $1.0MW/m^2$에 대해, 100,000 사이클 이상과 2,655 사이클로 계산되었으며, 시간적 제약을 고려 최종 평가는 $1.0MW/m^2$에 대해, 3,000사이클 정도의 실험을 통해 그 수명까지 접합건전성이 유지되는 지 실험을 통해 평가할 예정이다.

  • PDF