• Title/Summary/Keyword: Protect Device

Search Result 385, Processing Time 0.023 seconds

Stress Analysis and Shape Optimization of Dynamic Locking Tongue (DLT) Using FEM (FEM을 이용한 Dynamic Locking Tongue(DLT)의 강도 해석 및 형상 최적화)

  • Choi, Ji-Hun;Park, Tae-Won;Lee, Jin-Hee
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.6
    • /
    • pp.699-705
    • /
    • 2012
  • The role of a seat belt in a vehicle is to protect the driver from injury when a crash occurs. However when a large crash occurs, the driver slips forward and receives a strong impact. To prevent this situation, improvement of seat belts is essential. In this study, the new concept of a dynamic locking tongue (DLT) for seat belts is developed. The DLT device is used to reduce the impact to the driver's chest by tightening the webbing, so the driver is protected from severe injury in a large crash. First, a finite element model of the DLT device is created using SAMCEF and structural analysis is conducted with boundary conditions similar to those found in experiments. Then, the stress in the DLT device can be calculated. Second, the shape of the DLT device is optimized using the response surface analysis method in order to minimize the stress and weight. The validity of the optimization of the DLT device is verified using structural analysis.

A Secure BLE Integration Authentication System for a BLE Device Control Server based on Physical Web and Eddystone (Physical Web과 Eddystone 기반 BLE 디바이스 컨트롤 서버를 위한 안전한 BLE 통합 인증 시스템)

  • Nam, ChoonSung;Jung, Hyunhee;Shin, Dongryeol
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1094-1103
    • /
    • 2016
  • Physical Web and Eddystone can be serviced by a single integrated application on the device by using their servers' URL. However, they have a limitation that their servers must be customized for service characteristics on a case by case basis. In other words, regardless of the service selected for BLE, it should have a modified linkage application for each device. Hence, we think that a new integrated service platform, which is able to link and support its Beacon from the central server and is also able to support its application, is needed for achieving better service quality. This platform consists of push (Broadcasting for Beacon service) parts and pull (Connection) parts to establish communication. Especially, Pull should be operated and controlled under the authorization (secure) management for safe and trustable communication. It means that BLE must have its new authorization communications protocol to protect its data as much as possible. In this paper, we propose a BLE integrated authorization protocol for a BLE device control server based on Physical Web and Eddystone.

A Design of Technology Element-based Evaluation Model and its Application on Checklist for the IoT Device Security Evaluation (사물인터넷 기기 보안평가를 위한 기술요소 기반의 모델 설계 및 체크리스트 적용)

  • Han, Seul Ki;Kim, Myuhng Joo
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • As the demand for Internet of Things(IoT) increases, the need for the security of IoT devices is increasing steadily. It is difficult to apply the conventional security theory to IoT devices because IoT devices are subject to be constrained by some factors such as hardware, processor, and energy. Nowadays we have several security guidelines and related documents on IoT device. Most of them, however, do not consider the characteristics of specific IoT devices. Since they describes the security issues comprehensively, it is not easy to explain the specific security level reflecting each characteristics of IoT devices. In addition, most existing guidelines and related documents are described in view of developers and service proposers, and thus ordinary users are not able to assess whether a specific IoT device can protect their information securely or not. We propose an security evaluation model, based on the existing guidelines and related documents, for more specific IoT devices and prove that this approach is more convenient to ordinary users by creating checklists for the smart watch.

  • PDF

Prohibiting internal data leakage to mass storage device in mobile device (모바일 단말에서 외부 저장 매체로의 불법 데이터 유출 방지 기법)

  • Chung, Bo-Heung;Kim, Jung-Nyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.125-133
    • /
    • 2011
  • According to proliferation of mobile devices, security threats have been continuously increased such as illegal or unintentional file transmission of important data to an external mass-storage device. Therefore, we propose a protection method to prohibit an illegal outflow to this device and implement this method. This method extracts signatures from random locations of important file and uses them to detect and block illegal file transmission. To get signatures, a target file is divided by extracting window size and more than one signatures are extracted in this area. To effective signature sampling, various extraction ways such as full, binomial distribution-based and dynamic sampling are implemented and evaluated. The proposed method has some advantages. The one is that an attacker cannot easily predict the signature and its extraction location. The other is that it doesn't need to modify original data to protect it. With the help of these advantages, we can say that this method can increase efficiency of easy-to-use and it is a proper way leakage prevention in a mobile device.

Study on Selection of HTS Wire for Fabrication of Fault Current-limiting Type HTS Cables (사고전류 제한형 초전도케이블 제작을 위한 초전도 선재 선정에 관한 연구)

  • Heo, Soung-Ouk;Kim, Tae-Min;Han, Byung-Sung;Du, Ho-Ik
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.26 no.12
    • /
    • pp.904-908
    • /
    • 2013
  • When an abnormal condition occurs due to a fault current at a consumer location where electricity is supplied through a high-capacity and high-$T_c$ superconducting(HTS) cable, the HTS cable would be damaged if there is no appropriate measure to protect it. Therefore, appropriate measures are needed to protect HTS cables. The fault-current-limiting HTS cable that was suggested in this study performs an ideal transport current function in normal operations and plays a role in limiting a fault current in abnormal operation (i.e., when a fault current is applied). It has a structure that facilitated its self-current-limiting ability through device change and reconfiguration in the existing HTS cable without extra switching equipment. To complete this structure, it is essential to investigate about the selection of the superconducting wire. Therefore, in this paper, HTS wire using two types of different stabilization layer is compared and examined the stability and current limiting properties under the existence of a fault current.

A Design of Electronic Health Records Partial Encryption Method for Protecting Patient's Information on the U-Healthcare Environment (U-Healthcare 환경에서 환자정보보호를 위한 전자차트 부분 암호화 기법 설계)

  • Shin, Seon Hee;Kim, Hyun Chul;Park, Chan Kil;Jeon, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.91-101
    • /
    • 2010
  • By using the U-Healthcare environment, it is possible to receive the health care services anywhere anytime. However, since the user's personal information can be easily exposed in the U-Healthcare environment, it is necessary to strengthen the security system. This thesis proposes the technique which can be used to protect the personal medical records at hospital safely, in order to avoid the exposure of the user's personal information which can occur due to the frequent usage of the electronic chart according to the computerization process of medical records. In the proposed system, the following two strategies are used: i) In order to reduce the amount of the system load, it is necessary to apply the partial encryption process for electronic charts. ii) Regarding the user's authentication process for each patient, the authentication number for each electronic chart, which is in the encrypted form, is transmitted through the patient's mobile device by the National Health Insurance Corporation, when the patient register his or her application at hospital. Regarding the modern health care services, it is important to protect the user's personal information. The proposed technique will be an important method of protecting the user's information.

The design method of overheat protection orifice for power plant boiler super heated tube (발전용 보일러 주증기 튜브 과열방지용 오리피스 설계기법)

  • Kim, Bum-Shin;Yoo, Seong-Yeon;Ha, Jung-Su;Kim, Eui-Hyun
    • Proceedings of the KSME Conference
    • /
    • 2003.11a
    • /
    • pp.373-378
    • /
    • 2003
  • It is important that overheat protection of super heated tube in boiler operation and maintenance. The overheat of super heat tube can make damage and rupture of tube material, which causes accidental shutdown of boiler. The super heated tube overheat is almost due to the lack of uniformity of gas temperature distribution. There are two ways to protect overheat of super heated tube. The one is to control hot gas operation pattern which is temperature or flow distribution. the other is to control super heated steam flow distribution. The former is difficult than the later, because of control device design. In this paper steam flow control method which uses orifices is proposed to protect overheat of super heat tube.

  • PDF

A Digital Hologram Encryption Method Using Data Scrambling of Frequency Coefficients

  • Choi, Hyun-Jun
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.3
    • /
    • pp.185-189
    • /
    • 2013
  • A digital hologram generated by a computer calculation (computer-generated hologram or capture using charge-coupled device [CCD] camera) is one of the most expensive types of content, and its usage is expanding. Thus, it is highly necessary to protect the ownership of digital holograms. This paper presents an efficient visual security scheme for holographic image reconstruction with a low scrambling cost. Most recent studies on optical security concentrate their focus on security authentication using optical characteristics. However, in this paper, we propose an efficient scrambling method to protect a digital hologram. Therefore, we introduce in this paper several scrambling attempts in both the spatial domain and frequency domain on the basis of the results of analyzing the properties of the coefficients in each domain. To effectively hide the image information, 1/4, 1/256, and 1/16,384 of the original digital hologram needs to be scrambled for the spatial-domain scheme, Fresnel-domain scheme, and discrete cosine transform-domain scheme, respectively. The encryption schemes and the analyses in this paper can be expected to be useful in the research on encryption and other works on digital holograms.

Safely Improving Method to Zero-Harmonics Current with 4-Pole Low Voltage Circuit Breaker Equipped N-phase Trip Device (4극 저압차단기 N상 Trip장치를 사용한 영상고조파 안전성 개선방안)

  • Ki, Che-Ouk;Kim, Ju-Chul;Choi, Chang-Kyu
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2009.05a
    • /
    • pp.458-461
    • /
    • 2009
  • In 3-phase 4 wire system, appearance of the $3^{rd}$ harmonic current by increasing non-liner load is the one of causes overheating neutral wire of power line, and apparatus. So it is necessary to protect power-factor decreasing by the $3^{rd}$ harmonic, and electric power apparatus, and line safely, in this study, power system accidents caused by the $3^{rd}$ harmonic were investigated, then harmonic components analysis and unbalanced load analysis got accomplished. As result, we proposed the method to protect the power line and apparatus from over-current of neutral line by using the most economic 4-pole low voltage circuit breaker.

  • PDF

A Study on Inflation Performance Analysis and Test of A Wearable Airbag for Bikers (자전거 탑승자용 웨어러블 에어백의 팽창성능 해석 및 시험에 관한 연구)

  • Kim, Hyun Sik;Byun, Gi Sik;Baek, Woon Kyung
    • Journal of the Korean Society of Safety
    • /
    • v.34 no.2
    • /
    • pp.22-27
    • /
    • 2019
  • Bikers can be subjected to accidents during their bicycling. Helmets are only good, if any, for their head protection. A wearable airbag can protect the human neck area if it is properly designed. This airbag system is composed of an inflater and an airbag. The inflater contains a pressurized gas cylinder and a piercing device. The airbag is an inflatable fabric surrounding the human neck. When a bicycle accident happens, a sensor captures the motion of the biker and a microcomputer sends a signal to open a valve in the inflator to supply the pressurized gas to the airbag. An important issue of this system is that the airbag should be quickly inflated to protect the human neck. This paper deals with the airbag inflation time simulation and some issues to design a wearable airbag system. Also, a prototype was tested to show its feasibility using a human dummy mounted on a running cart.