• 제목/요약/키워드: Advanced Department System

검색결과 4,619건 처리시간 0.042초

Anti-crease Finish of Ramie Fabric

  • Lee, Tae-Sang;Sim, Ji-Hyun;Jang, Hae-Jin;Won, Fang-Fang;Lee, Seung-Goo
    • 한국염색가공학회:학술대회논문집
    • /
    • 한국염색가공학회 2009년도 학술발표대회
    • /
    • pp.144-145
    • /
    • 2009
  • PDF

신명 레이저와 X-선 발생 연구 (Simmyung Laser System and Study on the X-ray Generation)

  • Kong, Hong-Jin;Han, Ki-Gwan;Kim, Nam-Seong;Kim, Hyun-Soo;Um, Ki-Young;Park, Jong-Rak;Lee, Jae-Youg;Shin, Yun-Sup;Han, Ki-Ho
    • 한국광학회:학술대회논문집
    • /
    • 한국광학회 1995년도 광학 및 양자전자학 워크샵 논문집
    • /
    • pp.185-189
    • /
    • 1995
  • A high-power Nb:glass laser system(Simmyung I) has been contructed and tested. In this system, we used a Nb:YLF laser as a master oscillator, a 4-pass amplifier for pre-amplification, 5 stages of rod amplifiers, and spatial filtering and image reaying usits. The system has demonstrated in excess of 80J(2TW) with 40 psec(FWHM) pulse duration. Output energy, gain and spatial were measured at each amplification stage. With this laser system a preliminary X-ray generation experiment was performed. Pinhole images, X-ray diode signals and X-ray speriment were obtained for the irradiated target of copper. Detailed descriptions of the system performance and the X-tay generation experiment are presented.

  • PDF

A Survey on Intrusion-Tolerant System

  • Heo, Seondong;Kim, Pyeong;Shin, Yongjoo;Lim, Jungmin;Koo, Dongyoung;Kim, Yonggon;Kwon, Ohmin;Yoon, Hyunsoo
    • Journal of Computing Science and Engineering
    • /
    • 제7권4호
    • /
    • pp.242-250
    • /
    • 2013
  • Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is impossible to block all kinds of attacks. Furthermore, most of the proposed solutions require information about attacks for efficient prevention. Research on intrusion-tolerant systems (ITSs) have been conducted in order to continue providing proper services in threatening environments. The purpose of an ITS is to survive against every intrusion, rather than to prevent them. In this paper, previous studies on ITS are introduced and classified according to the centric scheme as middleware-based ITS, hardware-based ITS, and recovery-based ITS. Recent research focusing on adaptive transformation schemes is also introduced.