• Title/Summary/Keyword: 주의 해제

Search Result 136, Processing Time 0.02 seconds

Control of Prestressing Forces in a Splicing Method using the Partial Post-tensioning and Releasing Procedure (부분 긴장과 해제를 이용한 연속화 과정에서의 긴장력 조절)

  • 이환우;김광양
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.15 no.2
    • /
    • pp.251-259
    • /
    • 2002
  • A new splicing technique by the secondary moment which is intentionally induced by the tensioning effect of continuous tendons and the releasing effect of temporary beam tendons was developed. The tensioning and releasing works are essential and the decisions of the magnitude and order about them may be important engineering problems in this technique. In this paper, it was studied lot the practically optimum procedure of the tensioning and releasing works. As the result, it is concluded that the gradual progress through the three stages is reasonable for the procedure and the tensioning work have to precede the releasing work. Additionally, the magnitude of preceding tensioning force should be obtained by the sensitivity analysis and the minimum limit is more critical than the minimum limit.

Pseudonym Management in Autonomous Driving Environment (자율주행환경에서 가명성 관리)

  • Hong, Jin Keun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.29-35
    • /
    • 2017
  • In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.

Design and implementation of Android obfuscation technique using layout file transformation (레이아웃 파일 변환을 이용한 안드로이드 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.1-7
    • /
    • 2020
  • Android apps are mostly distributed as an apk files, and when the apk file is uncompressed, resource files such as xml files, images, and sounds related to app design can be extracted. If the resources of banking or finance-related apps are stolen and fake apps are distributed, personal information could be stolen or financial fraud may occur. Therefore, it is necessary to make it difficult to steal the design as well as the code when distributing the app. In this paper, we implemented a tool to convert the xml file into Java code and obfuscate using the Proguard, and evaluated the execution performance. If the layout obfuscation technique proposed in this paper is used, it is expected that the app operation performance can be improved and the illegal copying damage caused by the theft of the screen design can be prevented.

Program Execution Speed Improvement using Executable Compression Method on Embedded Systems (임베디드 시스템에서 실행 가능 압축 기법을 이용한 프로그램 초기 실행 속도 향상)

  • Jeon, Chang-Kyu;Lew, Kyeung-Seek;Kim, Yong-Deak
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.23-28
    • /
    • 2012
  • The performance improvement of the secondary storage is very slow compared to the main memory and processor. The data is loaded from secondary storage to memory for the execution of an application. At this time, there is a bottleneck. In this paper, we propose an Executable Compression Method to speed up the initial loading time of application. and we examined the performance. So we implemented the two applications. The one is a compressor for Execution Binary File. and The other is a decoder of Executable Compressed application file on the Embedded System. Using the test binary files, we performed the speed test in the six files. At the result, one result showed that the performance was decreased. but others had a increased performance. the average increasing rate was almost 29% at the initial loading time. The level of compression had different characteristics of the file. And the performance level was dependent on the file compressed size and uncompress time. so the optimized compression algorithm will be needed to apply the execution binary file.

A Feature Point Recognition Ratio Improvement Method for Immersive Contents Using Deep Learning (딥 러닝을 이용한 실감형 콘텐츠 특징점 인식률 향상 방법)

  • Park, Byeongchan;Jang, Seyoung;Yoo, Injae;Lee, Jaechung;Kim, Seok-Yoon;Kim, Youngmo
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.419-425
    • /
    • 2020
  • The market size of immersive 360-degree video contents, which are noted as one of the main technology of the fourth industry, increases every year. However, since most of the images are distributed through illegal distribution networks such as Torrent after the DRM gets lifted, the damage caused by illegal copying is also increasing. Although filtering technology is used as a technology to respond to these issues in 2D videos, most of those filtering technology has issues in that it has to overcome the technical limitation such as huge feature-point data volume and the related processing capacity due to ultra high resolution such as 4K UHD or higher in order to apply the existing technology to immersive 360° videos. To solve these problems, this paper proposes a feature-point recognition ratio improvement method for immersive 360-degree videos using deep learning technology.

Study on the Situational satisfaction survey of Smart Phone based on voice recognition technology (스마트 폰 음성 인식 서비스의 상황별 만족도 조사)

  • Lee, Yoon-jeong;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.351-357
    • /
    • 2017
  • The purpose of this study is to analyze the relationship between users' expectation and satisfaction through analyzing smart phone voice recognition service and surveying the situational satisfaction of voice recognition service. First, the concept and current status of speech recognition service were investigated through literature research, and the questionnaire survey was carried out through questionnaires based on the second and third principles. As a result, the user is most likely to use the smartphone voice recognition service when making a telephone call. Also, it was found that the service is the most used at home and the service is used most when the hand is not available. Through these results, various methods such as personalization service, condition recognition function, automatic emergency recognition, unlocking by voice could be derived. Based on this research, it is expected that it will be used effectively for improving smartphone voice recognition service and developing wearable device in the future.

A Handover Scheme for Seamless Service Support between Wired and Wireless Networks over BcN (BcN 환경에서 유선망과 무선망간의 끊김없는 서비스를 지원하기 위한 핸드오버 절차)

  • Yang, Ok-Sik;Choi, Seong-Gon;Choi, Jun-Kyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.799-808
    • /
    • 2005
  • This paper proposes low latency handover procedure for seamless connectivity and QoS support between wired (e.g. Ethernet) and wireless (e.g. WLAN, WiBro(802.16-compatible), CDMA) networks by the mobile-assisted and server-initiated handover strategy. It is assumed that the server decides the best target network considering network status and user preferences. In this algorithm a mobile terminal associates with the wireless link decided at the server In advance and receives CoA as well. When handover occurs without the prediction in wired networks, the server performs fast binding update using physical handover trigger through the MIH(media independent handover) function. As a result, a mobile terminal does not need to perform L2 and L3 handover during handover so that this procedure decreases handover latency and loss.

The Effect of Disintegrants on the Properties of Salicylamide Tablets (수종의 붕해제가 살리실아미드정제의 제제특성에 미치는 영향)

  • Hwang, Sung-Joo;Rhee, Gye-Ju;Jee, Ung-Kil;Kwak, Hyo-Sung;Kim, Chong-Kook
    • Journal of Pharmaceutical Investigation
    • /
    • v.22 no.1
    • /
    • pp.41-48
    • /
    • 1992
  • Six common tablet disintegrants (corn starch, Avicel PH102, calcium carboxymethylcellulose, Primojel, Kollidon CL and Ac-Di-Sol) were used at the concentration of 0, 2, 4 and 6% (w/w) in salicylamide tablets made with wet granulation method. Certain physical parameters of the disintegrants (moisture sorption, hydration capacity and bulk density) were determined to evaluate their relative efficiency. The disintegration time and dissolution rate of the tablets were correlated well with the ranks of initial rate of moisture sorption for each disintegrant as follows; Ac-Di-Sol, Kollidon CL, primojel, calcium CMC, corn starch and Avicel PH102. The initial rate of moisture sorption was important for the disintegration capacity as well as hydration capacity. The effect of storage at different temperatures and relative humidity upon the tablets containing various disintegrants was evaluated in terms of tablet hardness and disintegration time. Storage at high temperature reduced the hardness substantially and retarded the disintegration of the all tablets studied. Especially, the hardness of tablets containing Kollidon CL was significantly reduced. Although the tablet hardness was decreased and the disintegration time was increased under a moderate humid condition, both of them were decreased under the severely high humid condition of 80 or 90% RH, which was due to the breakrupture of tablet matrix bonds by the excessive uptake of moisture. Therefore, the stability caused by moisture sorption should be considered, when disintegrants having high moisture sorption such as Kollidon CL, Ac-Di-Sol and Primojel were employed in the tablets containing water-labile or hygroscopic drugs.

  • PDF

New method for the synthesis of 3-chloro-2-(4-chloro-2-fluoro-5-hydroxyphenyl)-4,5,6,7-tetrahydro-2H-indazole (3-Chloro-2-(4-chloro-2-fluoro-5-hydroxyphenyl)-4,5,6,7-tetrahydro-2H-indazole의 제조방법에 관한 연구)

  • Park, Chang-Min;Park, Kwan-Young;Kim, Hyoung-Rae;Song, Jong-Hwan;Hwang, In-Taek;Jeon, Dong-Ju
    • The Korean Journal of Pesticide Science
    • /
    • v.9 no.1
    • /
    • pp.23-25
    • /
    • 2005
  • 3-Chloro-2-(4-chloro-2-fluoro-5-hydroxyphenyl)-4,5,6,7-tetrahydro-2H-indazole, which is the key intermediate of cyclic imide type compounds such as EK 5439 and S-275 series, were practically synthesized by the procedure of hydrolysis of by-products and were produced in the reaction of 2-(2-fluoro-4-chloro-5-hydroxyphenyl)-2,3a,4,5,6,7-hexahydroindazol-3-one with phosgene.

A Handover Procedure for Seamless Service Support between Wired and Wireless Networks (유선망과 무선망간의 끊김없는 서비스를 지원하기 위한 핸드오버 절차)

  • Yang, Ok-Sik;Choi, Seong-Gon;Choi, Jun-Kyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.45-52
    • /
    • 2005
  • This paper proposes low latency handover procedure for seamless connectivity and QoS support between wired (e.g. Ethernet) and wireless (e.g. WLAN, WiBro(802.16-compatible), CDMA) networks by the mobile-assisted and server-initiated handover strategy. It is assumed that the server decides the best target network considering network status and user preferences. In this procedure, a mobile terminal associates with the wireless link decided at the server in advance and receives CoA as well. When handover occurs without the prediction in wired networks, the server performs fast binding update using physical handover trigger through the MIH (media independent handover) function. As a result, a mobile terminal does not need to perform L2 and L3 handover during handover so that this procedure decreases handover latency and loss.