• Title/Summary/Keyword: IT보안

Search Result 5,408, Processing Time 0.036 seconds

Effect of the Inner Pressure on a Hybrid Composite Flywheel Retor (하이브리드 복합재 플라이휠 로터에 작용하는 내압의 효과)

  • Oh Je-Hoon;Han Sang-Chul;Kim Myung-Hoon;Ha Sung Kyu
    • Composites Research
    • /
    • v.18 no.1
    • /
    • pp.45-54
    • /
    • 2005
  • The delamination in the filament-wound composite flywheel rotor often lowers the performance of the flywheel energy storage system. A conventional ring type hub usually causes tensile stresses on the inner surface of the composite rotor, resulting in lowering the maximum rotational speed of the rotor. In this work, the stress and strain distributions within a hybrid composite rotor were derived from the two-dimensional governing equation with the specified boundary conditions, and an optimum pressure at the inner surface of the rotor was proposed to minimize the strength ratio and maximize the storage energy. A split type hub was introduced to apply the calculated optimum pressure at the inner surface, and a spin test was performed up to 40,000 rpm to demonstrate the performance of the split type hub with radial and circumferential strains measured using a wireless telemetry system. From the analysis and the test, it was found that the split type hub successfully generates a compressive pressure on the inner surface of the rotor, which can enhance the performance of the composite rotor by lowering the strength ratio within the rotor.

International Trends for Utilization of Maritime Radio Communication Systems (해상무선통신시스템의 적용에 관한 국제동향 연구)

  • Jeong, Jung-Sik;Kim, Byung-Ok;Jang, Dong-Won;An, Kwang;Choi, Seong-Yong
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2006.05a
    • /
    • pp.177-183
    • /
    • 2006
  • IMO and ITU-R have done an intensive study to develop performance standards and technical standards of maritime digital communication systems, respectively. In particular, each administration strives to develop new agenda items of adopting digital new technologies. IMO COMSAR submitted draft performance standard of LRIT to IMO MSC, so that IMO mandates carriage requirement of LRIT In addition to that, COMSAR is preparing performance standard of AIS-SART, and approved the utilization of mobile phones for SAR activities. On the other hand, a new agenda item concerning E-navigation strategy was submitted to MSC 81th meeting. These challenges toward enhanced maritime radio communication systems would make it change largely the concepts of traditional navigation We suggest future directions of maritime information communication systems, investigating the study results of IMO and ITU-R.

  • PDF

Empirical Study on the Performance Analysis and Function of Jindo Coastal Vessel Traffic Service (진도 연안VTS의 성과 분석 및 기능에 관한 실증적 연구)

  • Jeong, Jae-Yong;Jung, Cho-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.18 no.4
    • /
    • pp.308-315
    • /
    • 2012
  • Hebei Spirit Oil Spill that happened in 2007 had prompted the need of revisiting the coastal safety. In response to this, Korea had made an effort to implement VTS in every coastline in the country. There are a lot of theoretical studies on VTS function nowadays, but coastal VTS are less frequently studied. In this paper, performance analysis results and accident prevention activities of Jindo Coastal VTS center were summarized and the Coastal VTS function are investigated. Jindo Coastal VTS covers relatively wide area and various places with various maritime traffic characteristics are the major navigation vessels, which means that it is important to control these vessels. Since the probability of accidents due to human error is relatively high in coastal area due to negligence tendency of crews during coastal area navigation, coastal VTS has to provide sufficient assistance to navigating vessels. Like most harbour VTS, Coastal VTS provides not only main information service, navigational assistance and traffic organization services but also various services related with advanced search-and-rescue assistance, marine national security, maritime crime prevention, oil spill response, traffic services for non-service vessel, and safety supervision for water leisure boats.

Mobile phone payment system using a light signal (휴대폰의 광원을 이용한 디지털 카드 시스템)

  • Hu, Moon-Heang;Shin, Moon-Sun;Ryu, Kuen-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1237-1244
    • /
    • 2009
  • In this paper, we proposed a mobile phone payment system using light signal containing payment related information. The digicard system we proposed creates virtual mobile card such as credit numbers and the created information is loaded in mobile phone. The virtual card information should be changed to pulse signal by light signal devices of mobile phone and the specific digicard system reader is able to read light signal. In recent years, a mobile phone payment system has been developed in order to provide user's convenience. But the mobile phone payment system has problems such as the production costs and complex and large size. In order to solve the aforementioned problems, we proposed mobile phone payment system being implemented by updating software without additional hardware modules. Therefore it is possible to apply the proposed digicard system to all kinds of mobile phone. Also encryption module is implemented to solve the problem of the security and privacy. According to an aspect of the present invention, there is provided a mobile phone payment system using a light signal containing payment-related information, comprising: a mobile phone; a photo receiver: and a control server.

Design and Development of Middleware for Clinical Trial System based on Brain MR Image (뇌 MR 영상기반 임상연구 시스템을 위한 미들웨어 설계 및 개발)

  • Jeon, Woong-Gi;Park, Kyoung-Jong;Lee, Young-Seung;Choi, Hyun-Ju;Jeong, Sang-Wook;Kim, Dong-Eog;Choi, Heung-Kook
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.6
    • /
    • pp.805-813
    • /
    • 2012
  • In this paper, we have designed and developed a middleware for an effectively approaching database to the existed brain disease clinical research system. The brain disease clinical research system was consisted of two parts i.e., a register and an analyzer. Since the register collects the registration data the analyzer yields a statistical data which based on the diverse variables. The middleware has designed to database management and a large data query processing of clients. By separating the function of each feature as a module, the module which was weakened connectivity between functionalities has been implemented the re-use module. And image data module used a new compression method from image to text for an effective management and storage in database. We tested the middleware system using 700 actual clinical medical data. As a result, the total data transmission time was improved maximum 115 times faster than the existing one. Through the improved module structures, it is possible to provide a robust and reliable system operation and enhanced security functionality. In the future, these middleware importances should be increased to the large medical database constructions.

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

A Efficient RSIP Address Translation Technique in Linux-based Intranet Environment (리눅스기반 인트라넷 환경에서 효율적인 RSIP주소 변환기법)

  • Lee, Youngtaek;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.39-48
    • /
    • 2004
  • An IP address shortage problem is happening with a rapid propagation of the Internet and demands about a new IP address. Address translation technology as NAT is becoming use widely in order to solve these problems. NAT is an very useful If address translation technique that allows two connected networks to use different and incompatible IP address schemes. Rut it is difficult to use NAT particularly for applications that embeded IP addresses in data payloads or encrypted IP packet to guarantee End-to-End Security such as IPSec. In addition to rewiting the source/destination IP address in the packet, NAT must modify IP checksum every time, which could lead to considerablely performance decrease of the overall system in the process of address translation. RSIP is an alternative to solve these disadvantages and address shortage problems of NAT. Both NAT and RSIP divide networks into inside and outside addressing realms. NAT translates addresses between internal network and external network, but RSIP uses a borrowed external address for outside communications. RSIP server assigns a routable, public address to an RSIP client temporaily to communicate with public network outside the private network. In this paper, I will analyze NAT and RSIP gateway system, and then I will propose the Linux-based RSIP gateway for more efficient IP Address Translation in Intranet environments based on RSIP standard of IETF.

  • PDF

A Case Study of Automation Management System of Damaged Container in the Port Gate (항만 게이트의 데미지 컨테이너 관리 자동화 시스템 구축 사례연구)

  • Cha, Sang-Hyun;Noh, Chang-Kyun
    • Journal of Navigation and Port Research
    • /
    • v.41 no.3
    • /
    • pp.119-126
    • /
    • 2017
  • As container vessels get larger, container terminals are also likely to grow. The problem that arises is that the growing volume should be handled in the same amount of time as before. Container terminals are introducing an automation system in order to overcome the limitations of existing manual methods and to continuously reduce operating expenses. Because, Manual handling of carrying containers gate in and out of terminals causes inaccurate data, which results in confusion. An alternative is for containers to be labeled with barcodes that can be scanned into a system with a scanner, but this takes quite a long time and is inconvenient. A RFID system, also known as a gate automation system, can solve these problems by reducing the time of gate management with a technology that detects number identification plates, helping operators more efficiently perform gate management work. Having said that, with this system, when container damage is detected, gate operators make and keep documents manually. These documents, which are insufficient evidence in proving container damage, result in customer claims. In addition, it is difficult for gate operators and other workers to manage containers, exposing them to danger and accidents. This study suggests that if an automation system is introduced at gates, containers can be managed by a video storage system in order to better document damage The video system maintains information on container damage, allowing operators the ability to search for videos they need upon customer request, also allowing them to be better prepared for customer claims. In addition, this system reduces necessary personnel and risk of accidents near gates by integrating a wide range of work.

The Global Trends in the Private Security Industry and the Strategies for the South Korean Private Security Industry : Focusing on the U. S. Security Industry (해외 시큐리티 산업의 동향과 한국의 대응전략 : 미국 사례를 중심으로)

  • Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.271-289
    • /
    • 2006
  • Private security industry in South Korea has rapidly been growing in recent years. However, such a rapid growth is being criticized for its focus on external results, which has produced a number of problems. The continued growth of private security industry can be only based upon substantive and qualitative development. In this aspect, it is necessary to consider the global trends of the private security industry, particularly the recent trends of the U. S. security industry which has led the global security industry. This is because the recent trends of the U. S. private security industry would guide the future direction of the private security industry in South Korea. The U. S. private security industry has been replacing the role of law enforcement agencies including the police, from crime prevention to investigation and disaster management, not to mention asset protection and loss prevention. The recent trends of the U. S. security industry appears to be summarized by such characteristics as variety, specialty, and integration, which might account for the structural problem of the private security industry in South Korea. In short, the substantive and qualitative development of the private security industry in South Korea should be accomplished by strengthening its specialty and integration, and also widening its variety.

  • PDF

Probabilistic Prediction of the Risk of Sexual Crimes Using Weight of Evidence (Weight of Evidence를 활용한 성폭력 범죄 위험의 확률적 예측)

  • KIM, Bo-Eun;KIM, Young-Hoon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.4
    • /
    • pp.72-85
    • /
    • 2019
  • The goal of this study is to predict sexual violence crimes, which is an routine risk. The study used to the Weight of Evidence on sexual violence crimes that occurred in partly Cheongju-si for five years from 2011 to 2015. The results are as follows. First, application and analysis of the Weight of Evidence that considers the weight of evidence characteristics showed 8 out of total 26 evidences that are used for a sexual violence crimes risk prediction. The evidences were residential area, date of use permission for building, individual housing price, floor area ratio, number of basement floor, lot area, security light and recreational facility; which satisfied credibility in the process of calculating weight. Second, The weight calculated 8 evidences were combined to create the prediction map in the end. The map showed that 16.5% of sexual violence crimes probability occurs in 0.3㎢, which is 3.3% of the map. The area of probability of 34.5% is 1.8㎢, which is 19.0% of the map and the area of probability of 75.5% is 2.0㎢, which is 20.7% of the map. This study derived the probability of occurrence of sexual violence crime risk and environmental factors or conditions that could reduce it. Such results could be used as basic data for devising preemptive measures to minimize sexual violence, such as police activities to prevent crimes.