• Title/Summary/Keyword: 산업기술유출

Search Result 316, Processing Time 0.028 seconds

Geotechnical Characteristics of Prefabricated Vertical Drain System for Contaminated Soil Remediation (오염토양 복원을 위한 연직배수시스템의 지반공학적 특성)

  • Shin, Eunchul;Park, Jeongjun
    • Journal of the Korean GEO-environmental Society
    • /
    • v.8 no.5
    • /
    • pp.5-14
    • /
    • 2007
  • The quantity of noxious wastes generated by the growth in industrialization and population in all over the world and its potential hazards in subsurface environments are becoming increasingly significant. The extraction of the contaminant from the soil and movement of the water are restricted due to the low permeability and adsorption characteristics of the reclaimed soils. Incorporated technique with PVDs have been used for dewatering from fine-grained soils for the purpose of ground improvement by means of soil flushing and soil vapor extraction systems. This paper is to evaluate several key parameters that affected to the performance of the PVDs specifically with regard to: well resistance of PVD, zone of influence, and smear effects. In the feasibility of contaminant remediation was evaluated in pilot-scale laboratory experiments. Well resistance is affected on the vertical discharge capacity of the PVDs under the various vacuum pressures. The discharge capacity increases consistently in areal extents with higher applied vacuum up to a limiting vacuum pressure. The head values for each piezometer at different vacuum pressures show that the largest head loss occurs within 14 cm of the PVD. Air flow rates and head losses were measured for the PVD placed in the model test box and the gas permeability of the silty soils was calculated. Increasing the equivalent diameter results in a decrease in the calculated gas permeability. It is concluded that the gas permeability determined over the 1,500 to 2,000 $cm^3/s$ flow rates are the most accurate values which yields gas permeability of about 3.152 Darcy.

  • PDF

A Study on the Detection Model of Illegal Access to Large-scale Service Networks using Netflow (Netflow를 활용한 대규모 서비스망 불법 접속 추적 모델 연구)

  • Lee, Taek-Hyun;Park, WonHyung;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.11-18
    • /
    • 2021
  • To protect tangible and intangible assets, most of the companies are conducting information protection monitoring by using various security equipment in the IT service network. As the security equipment that needs to be protected increases in the process of upgrading and expanding the service network, it is difficult to monitor the possible exposure to the attack for the entire service network. As a countermeasure to this, various studies have been conducted to detect external attacks and illegal communication of equipment, but studies on effective monitoring of the open service ports and construction of illegal communication monitoring system for large-scale service networks are insufficient. In this study, we propose a framework that can monitor information leakage and illegal communication attempts in a wide range of service networks without large-scale investment by analyzing 'Netflow statistical information' of backbone network equipment, which is the gateway to the entire data flow of the IT service network. By using machine learning algorithms to the Netfllow data, we could obtain the high classification accuracy of 94% in identifying whether the Telnet service port of operating equipment is open or not, and we could track the illegal communication of the damaged equipment by using the illegal communication history of the damaged equipment.

On-Line music score recognition by DPmatching (DP매칭에 의한 On-Line 악보인식)

  • 구상훈;이병선;김수경;이은주
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.502-511
    • /
    • 2002
  • 컴퓨터의 기술적 발전은 사회 여러 분야에 막대한 영향을 끼쳤다. 그중 악보인식분야에도 커다란 영향을 주었다. 그러나, On-line 상에서 그린 악보를 실시간으로 정형화된 악보형태로 변환하는 처리에 대한 연구가 미흡하여 이에 대한 연구가 필요하다. 본 논문에서는 실시간으로 악보를 인식하고, 사용자의 편의를 도모하기 위해 DP(Dynamic Programming) 매칭 법을 이용한 On-Line 악보인식에 관한 방법을 제안하였다. 본 연구에서는 실시간으로 입력되는 악상기호를 인식하기 위해, 가장 유효한 정보인 악상 기호내의 방향, x, y 좌표를 이용하여 벡터형태로 추출한 후 음표와 비음 표(쉼표, 기타기호)의 두개의 그룹으로 나누어진 표준패턴과의 DP매칭을 통해 인식한다. 먼저 tablet을 통해 실시간으로 악상 기호를 입력할 때 생기는 x, y좌표를 이용하여, 펜의 움직임에 대한 16방향 부호화를 수행한다. 음표와 비 음표를 구분하기 위한 시간을 줄이고자 16방향 부호화를 적용하지 않고 사사분면부호화를 적용한다. 음표를 약식으로 그릴 경우 음표 머리에 해당하는 부분의 좌표는 삼사분면에 분포하고, 폐곡선의 음표일 경우에는 좌표가 사사분면에 고르게 나타난다. 폐곡선을 제외한 음표의 머리는 폐곡선과 같은 조건이면서 입력받은 y좌표 값들 중에서 최소 값과 최대 값을 구한 다음 2로 나눈 값을 지나는 y좌표의 개수가 임의의 임계값 이상이면 음표로 판단한다. 위 조건을 만족하지 않을 경우 비 음표로 취급한다. 음표와 비 음표를 결정한 다음, 입력패턴과 표준패턴과의 DP매칭을 통하여 벌점을 구한다. 그리고 경로탐색을 통해 벌점에 대한 각각의 합계를 구해 최소 값을 악상기호로 인식하였다. 실험결과, 표준패턴을 음표와 비음표의 두개의 그룹으로 나누어 인식함으로써 DP 매칭의 처리 속도를 개선시켰고, 국소적인 변형이 있는 패턴과 특징의 수가 다른 패턴의 경우에도 좋은 인식률을 얻었다.리되고 이원화된 코드체계와 데이터 형태의 이질화를 통일하는 방법으로 데이터웨어하우스 시스템을 제시하였다. 결국 병원에서 데이터웨어하우스 시스템의 구축은 임상, 연구, 교육의 유기적 순환관계를 정립하여 지식의 순환적 고리인 수집, 공유, 확산, 재창출을 지속적 유지할 수 있는 인프라를 구축해 준다. 반면 상이한 정보들간의 충돌과 이에 따른 해석의 오류로 잘못된 의사결정을 위한 정보를 제공할 수 있고 기초정보의 접근 및 추출의 유용성에 의해서 정보유출에 대한 문제가 한계점으로 나타났다.로세스 개선을 위해서 무엇을 정말로 필요로 하는지를 밝힘으로써, 한국 소프트웨어 산업의 현실적인 특수성을 고려한 소프트웨어 프로세스 평가와 개선 모델의 개발을 위한 기초적인 자료를 제공할 것으로 예상된다. 또한, 본 연구 결과는, 우리나라 소프트웨어 조직들이 실제로 무엇을 필요로 하는지를 밝힘으로써, 우리나라의 소프트웨어 산업을 육성하기 위한 실효성 있는 정책 입안을 위한 기초 자료를 제공할 것으로 예상된다.를 검증하려고 한다. 협력체계 확립, ${\circled}3$ 전문인력 확보 및 인력구성 조정, 그리고 ${\circled}4$ 방문보건사업의 강화 등이다., 대사(代謝)와 관계(關係)있음을 시사(示唆)해 주고 있다.ble nutrient (TDN) was highest in booting stage (59.7%); however no significant difference was found among other stages. The concentrations of Ca and P were not different among mature stages. According to these results, the yellow ripe period is appropriate to harvest the whole crop rice for forage considering

  • PDF

Design and Implementation of IoT Chatting Service Based on Indoor Location (실내 위치기반 사물인터넷 채팅 서비스 설계 및 구현)

  • Lee, Sunghee;Jeong, Seol Young;Kang, Soon Ju;Lee, Woo Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.10
    • /
    • pp.920-929
    • /
    • 2014
  • Recently, embedded system which demand is explosively increasing in the fields of communication, traffic, medical and industry facilities, expands to cyber physical system (CPS) which monitors and controls the networked embedded systems. In addition, internet of things(IoT) technology using wearable devices such as Google Glass, Samsung Galaxy Gear and Sony Smart Watch are gaining attention. In this situation, Samsung Smart Home and LG Home Chat are released one after another. However, since these services can be available only between smart phones and home appliances, there is a disadvantage that information cannot be passed to other terminals without commercial global messaging server. In this paper, to solve above issues, we propose the structure of an indoor location network based on unit space, which prevents the information of the devices or each individual person from leaking to outside and can selectively communicate to all existent terminals in the network using IoT chatting. Also, it is possible to control general devices and prevent external leakage of private information.

Ecotoxicity Studies of Photoactive Nanoparticles Exposed to Ultraviolet Light (자외선에 노출된 광반응성 나노물질의 생태독성 연구)

  • Kim, Shin-Woong;Lee, Woo-Mi;Shin, Yu-Jin;An, Youn-Joo
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.34 no.1
    • /
    • pp.63-71
    • /
    • 2012
  • As nanotechnology is a key industry, there is growing concern relating to the potential risk of nanoparticles. They are known to be released into the environment via various exposure routes. When nanoparticles are present in water environments, they are supposed to be illuminated by ultraviolet light, and the ecotoxicity of photoactive nanoparticles may be changed. In this study, a review of the ecotoxicity of photoactive nanoparticles, including the mechanisms of phototoxicity, are presented. In order to address this issue, studies on the ecotoxicity to soil and water organisms exposed to photoactive nanoparticles were investigated. The photoactive nanoparticles chosen for this study were zinc oxide, titanium dioxide and fullerene. Microorganisms, nematode, earthworm, algae and fish, etc., were chosen to assess the toxicity of nanoparticles using diverse methods. However, studies on the phototoxicity potentially induced by nanoparticles on UV illumination have been reviewed in only 8 studies. From a few studies, photoactive nanoparticles have shown high dissolution rates under UV conditions, with the released ions observed to profoundly influence test organisms. In addition, NPs exposed to UV produced reactive oxygen species (ROS). These ROS can induce oxidative stress in exposed organisms. Evidence of phototoxicity by nanoparticles were found based on previous studies.

Current Trend of EV (Electric Vehicle) Waste Battery Diagnosis and Dismantling Technologies and a Suggestion for Future R&D Strategy with Environmental Friendliness (전기차 폐배터리 진단/해체 기술 동향 및 향후 친환경적 개발 전략)

  • Byun, Chaeeun;Seo, Jihyun;Lee, Min kyoung;Keiko, Yamada;Lee, Sang-hun
    • Resources Recycling
    • /
    • v.31 no.4
    • /
    • pp.3-11
    • /
    • 2022
  • Owing to the increasing demand for electric vehicles (EVs), appropriate management of their waste batteries is required urgently for scrapped vehicles or for addressing battery aging. With respect to technological developments, data-driven diagnosis of waste EV batteries and management technologies have drawn increasing attention. Moreover, robot-based automatic dismantling technologies, which are seemingly interesting, require industrial verifications and linkages with future battery-related database systems. Among these, it is critical to develop and disseminate various advanced battery diagnosis and assessment techniques to improve the efficiency and safety/environment of the recirculation of waste batteries. Incorporation of lithium-related chemical substances in the public pollutant release and transfer register (PRTR) database as well as in-depth risk assessment of gas emissions in waste EV battery combustion and their relevant fire safety are some of the necessary steps. Further research and development thus are needed for optimizing the lifecycle management of waste batteries from various aspects related to data-based diagnosis/classification/disassembly processes as well as reuse/recycling and final disposal. The idea here is that the data should contribute to clean design and manufacturing to reduce the environmental burden and facilitate reuse/recycling in future production of EV batteries. Such optimization should also consider the future technological and market trends.

A Study on the Policy of the technical manpower of Small and medium SW companies in the Digital Convergence (디지털 융합시대 중소 SW기업 기술인력의 안정적 확보 정책 연구)

  • Noh, Kyoo-Sung;Yang, Chang-Joon
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.89-99
    • /
    • 2022
  • Due to COVID-19, non-face-to-face cultures such as remote classes, remote work, and tele-medicine are spreading. The major contributors to the settlement of such a non-face-to-face society are small and medium SW companies and SW manpower. However, recently as large platform companies and foreign big tech companies hire thousands of SW manpower, SW small and medium-sized companies are experiencing a serious manpower shortage. Therefore, the purpose of this study is to suggest policy alternatives for SMEs to stably secure SW manpower and support continuous business operation. To achieve this purpose, this study examines the current status of the SW industry and manpower, then summarizes related issues and suggests policy alternatives to solve these issues. Those policies include the reinforcement of incentives to support manpower retention such as the Naeil Chaeum deduction system, youth housing union composition, special military service system, recruitment of manpower through the contract semester system of employment conditions, reinforcement of customized education through supplementation of the SW manpower training voucher system, SW field skill standardization, establishment of a governance system for nurturing SW manpower, preparation of countermeasures against the outflow of manpower to large companies, and a win-win cooperation program for large and SME SW manpower.

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.

A Study on the Information Security System of Fin-Tech Business (핀테크 기업의 정보보안체계 관한 연구)

  • Kang, Young-Mo;Lee, Young-Geun;Kwon, Hyun-Jung;Han, Keyung-Seok;Chung, Hyun-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.19-24
    • /
    • 2016
  • A Study on the Information Security System of Fin-Tech Business In traditional electronic commerce, there have not been severe issues of trading information through documents in paper or the closed EDI. The scale of e-commerce has increased as internet develops, however, turning to the online e-commerce, which caused a number of issues such as authentication, information forgery, and non-repudiation between the parties. To prevent conflicts from such troubles and perform the post management, security technologies are applied throughout the process of e-commerce, certificates intervening. Lately, meanwhile, FinTech has been creating a sensation around the mobile payment service. Incidents of information leakage from card corporations and hackings imply the need of securing safety of the financial service. Development and evolution of FinTech industry must be accompanied by information protection. Therefore, this research aims to inquire into the information security system of leading FinTech company in a foreign country.

Reversible Watermarking For Relational Databases using DE (Difference Expansion) Algorithm (DE 알고리즘을 사용한 관계형 데이터베이스를 위한 가역 워터마킹)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.7-13
    • /
    • 2015
  • Generally, watermarking can be used copyright for contents such as audios, videos, images, and texts. With the development of Internet, many malicious attackers illegally copy relational databases synchronized applications Therefore, it is needed for the protection of databases copyright, because databases involve various sensitive information such as personal information, information industry, and secret national intelligence. Thus, the protection of relational databases is a major research field in the databases research topics. In this paper, we will review previous researches related the protection of relational databases and propose new method for relational data. Especially, we propose watermarking scheme for databases using reversible method in this paper. As an experimental result, the proposed scheme is very strong to malicious attacks. In addition, we proved our proposed scheme is to apply real application.