• Title/Summary/Keyword: 내장 시스템

Search Result 1,385, Processing Time 0.028 seconds

Removal of Radioactive Caesium ion using Ferromagnetic in water : A reivew (강자성체를 통한 수중의 방사능 세슘이온 제거 동향)

  • Yeo, Wooseok;Kim, Jong Kyu
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.266-270
    • /
    • 2018
  • 원자력 방사능 폐기물 또는 원자력 발전소 해체시 발생 가능한 세슘 이온은 인체뿐만 아니라 생태계 환경에도 큰 악영향을 미친다고 알려져 있다. 이러한 세슘 이온은 자연 속으로 손쉽게 스며들어 발생한 지역뿐만 아니라 쉽게 퍼지게 되어 넓은 지역까지 피해를 주게 되며, 반감기가 30년으로써 한번 자연계에 누출되면 장시간 잔존하여 인간 및 생태계에 악영향을 미치게 된다. 세슘이온이 몸속에 들어오게 되면 장에서 몸으로 100% 흡수되며 내장에 축척되어 연조직 전체에 분포하게 되며 갑상선 암과 같은 심각한 위험에 초래하게 된다. 2011년 발생한 후쿠시마 원전 사고 이후 국내에서도 많은 관심을 가지기 시작하였으며, 따라서 수중의 세슘이온을 제거하기 위하여 나노 입자 형태의 기능성을 가진 물질들을 적용한 많은 연구가 이루어지고 있다. 이러한 나노물질들은 수중의 세슘이온 제거에 대하여 우수한 제거효율을 보여주고 있으나 나노 입자 특성상 사용 이후 회수가 어려워 기능성 물질들의 확산 및 축적에 따른 2차 환경오염의 문제점까지 발생하게 된다. 최근 수처리 분야에서 외부 자기장을 주게 되면 자성을 띄게 되는 물질인 자성체에 대한 관심이 급등하고 있다. 이러한 자성체들은 수중에서 별도의 회수 시스템 없이 자성으로 인하여 완벽히 자기분리 된다. 세슘제거에 탁월한 기능성 물질과 완벽한 자기분리가 가능한 자성체를 결합하여 특별한 회수장치 없이 외부 자기장만 주어진다면 수중의 세슘을 효과적으로 제거 또는 처리할 수 있다. 자성체 입자 표면에 흡착제인 프러시안 블루나 제올라이트와 같은 흡착제를 합성하여 수중의 세슘을 제거하는 연구가 활발히 이루어지고 있다. 그러나 기존의 자성체보다 좀 더 높은 자성을 가지고 있으며 외부 자기장에 의해 강하게 반응을 한다고 알려져 있는 강자성체(Ferromagnetic)를 사용하게 된다면 흡착제와 결합 이후 더욱더 강한 자성을 가진 흡착제가 탄생하며 이를 사용하면 높은 처리율뿐만 아니라 높은 슬러지 회수율을 가질 수 있다. 따라서 본 연구는 흡착제나 이온교환수지와 같은 기능성 물질을 사용하여 수중의 세슘을 제거하는 메커니즘과 강자성체가 가지고 있는 강한 자성의 성질을 결합한 복합체 제조에 대한 연구조사를 중점적으로 실시하였다. 본 연구에 의해 연구 조사된 결과를 바탕으로 수중의 세슘 이온에 대하여 높은 제거효율과 회수율을 가지는 새로운 형태의 복합체 제조에 관한 정보를 제공하고자 한다.

  • PDF

Authentication of a smart phone user using audio frequency analysis (음향 주파수 분석을 이용한 스마트폰 사용자 인증)

  • Kim, Jin-Bok;Song, Jeong-Eun;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.327-336
    • /
    • 2012
  • In this paper, we propose user authentication methods using a microphone and a speaker in smart phones. The proposed methods guarantee that the user is located close to the target device by transmitting the challenge via an audio channel. We propose two authentication methods; user authentication for a PC or a website using a smart phone as a hardware token, and user authentication to log on to a smart phone using a PC as a token. Because our methods use typical peripheral devices such as a microphone and a speaker, they do not require any special-purpose hardware equipment. In addition, the elderly and the handicapped can easily use our methods because the methods are activated by simple operations.

Proposal of a framework for evaluating the operational impact of cyber attacks on aviation weapons systems(EOICA) (항공무기체계 사이버공격에 대한 작전영향성평가 프레임워크 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Lee, Soo-jin;Lim, Jae-sung
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.35-45
    • /
    • 2020
  • Cyber attacks on the aviation weapon system, a state-of-the-art asset, have become a reality and are approaching as a constant threat. However, due to the characteristics of embedded software of the current aviation weapon system, it is managed and operated without connection to the network in peacetime, so the response management to cyber attacks is relatively weak. Therefore, when a cyber attack becomes a reality, it is urgent to prepare and evaluate measures for the adverse effects that such attack will have on the execution of the Air Tasking Order(ATO). In this paper, we propose a framework for operational impact assessment in order to avoid confusion in ATO execution and systematic response to cyber attacks on aviation weapons systems. The proposed framework is designed to minimize the negative impact on operations against cyber attacks that may occur under no warning by analyzing the impact on air operations for each aviation weapon system and standardizing countermeasures for this. In addition, it supports the operational commander to make a quick decision to command for the execution of the operation even in a situation where a cyber attack occurs.

A meta-study on the analysis of the limitations of modern artificial intelligence technology and humanities insight for the realization of a super-intelligent cooperative society of human and artificial intelligence (인간 및 인공지능의 초지능 협력사회 실현을 위한 현대 인공지능 기술의 한계점 분석과 인문사회학적 통찰력에 대한 메타 연구)

  • Hwang, Su-Rim;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1013-1018
    • /
    • 2021
  • Due to the recent accident caused by the automated vehicle, discussions on the ethical aspects of AI have been actively underway. This paper confirms that AI is inevitably connected to ethical components through the concepts and techniques related to robots-AI, and argues that ethical aspects are built-in, not post facto. Furthermore, this devises a solution to the trolley dilemma that can serve as a clue to ethical problems associated with automated vehicles. Preferentially, that process contains writing Bayesian networks. Next, only important and influential data are left after the pre-processing stage, and crowd-sourcing & extrapolation is used to calculate the exact figures of the networks. Through this process, this argues that humans' subjects are certainly included in implementing algorithms and models and discusses the necessity and direction of engineering liberal arts, especially education of ethics that distinguished from major education to prevent distortions and biases abouts AI systems.

A Study on Cable Tension Estimation Using Smartphone Built-in Accelerometer and Camera (스마트폰 내장 가속도계와 카메라를 이용한 케이블 장력 추정에 관한 연구)

  • Lee, Hyeong-Jin
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.25 no.5
    • /
    • pp.773-782
    • /
    • 2022
  • Estimation of cable tension through proper measurements is one of the essential tasks in evaluating the safety of cable structures. In this paper, a study on cable tension estimation using the built-in accelerometer and camera in a smartphone was conducted. For the experimental study, visual displacement measurement using a smartphone camera and acceleration measurement using a built-in accelerometer were performed in the cable-stayed bridge model. The estimated natural frequencies and transformed tensions from these measurements were compared with the theoretical values and results from the normal visual displacement method. Through comparison, it can be seen that the error between the method using the smartphone and the normal visual displacement is sufficiently small to be acceptable. It has also been shown that those errors are much smaller than the difference between the values calculated by the theoretical model. These results show that the deviation according to the type of measurement method is not large and it is rather important to use an appropriate mathematical model. In conclusion, in the case of cable tension estimation, it can be said that the visual displacement measurement and acceleration using a smartphone can be a sufficiently applicable method, just like the normal visual displacement method. It is also noteworthy that the smartphone accelerometer has a larger magnitude error and has more limitations such as high-frequency sampling instability compared to the visual displacement method, but shows almost the same performance as the visual displacement method in this cable tension estimation.

Prediction Model of CNC Processing Defects Using Machine Learning (머신러닝을 이용한 CNC 가공 불량 발생 예측 모델)

  • Han, Yong Hee
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.2
    • /
    • pp.249-255
    • /
    • 2022
  • This study proposed an analysis framework for real-time prediction of CNC processing defects using machine learning-based models that are recently attracting attention as processing defect prediction methods, and applied it to CNC machines. Analysis shows that the XGBoost, CatBoost, and LightGBM models have the same best accuracy, precision, recall, F1 score, and AUC, of which the LightGBM model took the shortest execution time. This short run time has practical advantages such as reducing actual system deployment costs, reducing the probability of CNC machine damage due to rapid prediction of defects, and increasing overall CNC machine utilization, confirming that the LightGBM model is the most effective machine learning model for CNC machines with only basic sensors installed. In addition, it was confirmed that classification performance was maximized when an ensemble model consisting of LightGBM, ExtraTrees, k-Nearest Neighbors, and logistic regression models was applied in situations where there are no restrictions on execution time and computing power.

Similarity Detection in Object Codes and Design of Its Tool (목적 코드에서 유사도 검출과 그 도구의 설계)

  • Yoo, Jang-Hee
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • The similarity detection to plagiarism or duplication of computer programs requires a different type of analysis methods and tools according to the programming language used in the implementation and the sort of code to be analyzed. In recent years, the similarity appraisal for the object code in the embedded system, which requires a considerable resource along with a more complicated procedure and advanced skill compared to the source code, is increasing. In this study, we described a method for analyzing the similarity of functional units in the assembly language through the conversion of object code using the reverse engineering approach, such as the reverse assembly technique to the object code. The instruction and operand table for comparing the similarity is generated by using the syntax analysis of the code in assembly language, and a tool for detecting the similarity is designed.

Modified AES having same structure in encryption and decryption (암호와 복호가 동일한 변형 AES)

  • Cho, Gyeong-Yeon;Song, Hong-Bok
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.1-9
    • /
    • 2010
  • Feistel and SPN are the two main structures in a block cipher. Feistel is a symmetric structure which has the same structure in encryption and decryption, but SPN is not a symmetric structure. In this paper, we propose a SPN which has a symmetric structure in encryption and decryption. The whole operations of proposed algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2 round, applies a right function and the last half of them, (N+1)/2 to N round, employs an inverse function. And a symmetry layer is located in between the right function layer and the inverse function layer. In this paper, AES encryption and decryption function are selected for the right function and the inverse function, respectively. The symmetric layer is composed with simple matrix and round key addition. Due to the simplicity of the symmetric SPN structure in hardware implementation, the proposed modified AES is believed to construct a safe and efficient cipher in Smart Card and RFID environments where electronic chips are built in.

Automatic Test case Generation Mechanism from the Decision Table of Requirement Specification Techniques based on Metamodel (메타모델 기반 요구사항 명세 기법인 의사 결정표를 통한 자동 테스트 케이스 생성 메커니즘)

  • Hyun Seung Son
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.2
    • /
    • pp.228-234
    • /
    • 2023
  • As the increasing demand for high-quality software, there is huge requiring for quality certification of international standards, industrial functional safety (IEC 61508), automotive (ISO 26262), embedded software guidelines for weapon systems, etc., in the industry. Software companies are very difficult to systematically acquire the quality certification in terms of cost and manpower of Startup, venture small-sized companies. For their companies one test case automatic generation is considered as a core technique to evaluate or improve software quality. This paper proposes a test case automatic generation method based on the design decision table for system and software design verification. We apply the proposed method with OMG's standard techniques of metamodel and model transformation for automatically generating test cases. To do this, we design the metamodels of design decision table (Model) and test case document (Text) and define model transformation to automatically generate test cases, which will expect to easily work MC/DC coverage.

Analysis of On-Site Inspection Results for Establishing Cost Estimation Standards for Selective Dismantling Projects (분별해체 대가기준 수립을 위한 현장실사 결과분석)

  • Heo, June Kyu;Kim, Chang Hak
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.44 no.4
    • /
    • pp.555-565
    • /
    • 2024
  • The government has enacted legislation to enforce selective dismantling in order to increase the recycling of construction waste. Therefore, this study aims to propose a standard quantity per unit estimation method, crucial for determining the expenses associated with large-scale demolition projects necessary for public development, particularly in the context of extensive land development ventures. Four individual houses were thoroughly examined and tested. We surveyed the house to create a floor plan and conducted a detailed investigation of interior materials in order to propose a Standard Quantity per Unit for cost estimation of the selective dismantling work. The process encompassed precise measurement of the houses, creation of schematics, thorough scrutiny of interior materials, and division of the dismantling process into components such as ceilings, walls, and floors. The duration of each dismantling task was meticulously documented. Particular emphasis was placed on refining the methodology to accommodate factors such as window openings, thereby ensuring a heightened level of precision compared to preceding studies. The outcomes of this study are anticipated to serve as practical benchmarks for estimating costs in demolition projects, thereby fostering sustainable development within the construction industry.