• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.028 seconds

The Transmit Method for Fingerprint sensing using Differential Pulse in Mutual Capacitance Touch Screen Panel for improving security of computer information (컴퓨터의 보안향상을 위한 상호정전용량 터치스크린패널의 차동펄스를 이용한 지문인식을 위한 송신법)

  • Kim, Seong Mun;Choi, Eun Ho;Ko, Nak Young;Bien, Franklin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.7
    • /
    • pp.55-60
    • /
    • 2017
  • This paper is proposed on the transmit Method Finger-Printer Scanning of Mutual Capacitance Touch Screen Panel Using Differential Pulse for improving the security of computer information. This system is composed of differential pulse generator and Ring-Counter, also Supply voltage is 5V. this system generates the Pulse wave which is composed of In-Phase and Out of Phase at 1MHz while period of 2m/s. it is designed and be able to operate four channels. overall power consumption is approximately 78.08nW. This prototype is implemented in 0.25um CMOS Process and Chip area is $870um{\times}880um$.

A Study on the Determination of Water Storage-Supply Capacity of Agricultural Reservoir (소규모 농업용 저수지의 저류량-용수공급능력 결정에 관한 연구)

  • 안승섭;정순돌;이증석;윤경덕;장인수
    • Journal of Environmental Science International
    • /
    • v.11 no.12
    • /
    • pp.1217-1226
    • /
    • 2002
  • This study aims at the effective estimation of water supply capacity of small scale reservoir and the proposal of the data which is necessary to establish the water resources management plan of down stream area of the reservoir in the future by comparison and examination about reservoir operation technique for the security of agricultural water in small scale reservoir. The result of flow calculation by Tank model is used for the input data as the inflow data which is needed for the analysis of water supply capacity. Stochastic method, simulation method, and optimization method are used to examine the water supply capacity, and water security amount is compared with each method. From the analyses of water supply capacities by each method, slightly different results are shown in spite of the effort to compare them equally using input data such as inflow data under equal conditions, and the comparison of water supply capacities by each method are as follows; linear planning method, simulation method, and transition probability matrix method in the order of amount from the largest. It is thought that the simulation method in which comparatively reasonable application of the inflow data is possible and is simulated in successive time series dam operation of the three methods used in this study thus, simulation model is proper to estimate the water supply capacity of agricultural small scale reservoir. And it is judged that the heightening of efficiency of water resources utilization according to the development of downstream area of dam may be possible using the upward readjusted water supply amount of $55.18{\tiems}10^6ton$ and $63.7{\times}10^6ton$ at 95% and 90% supply reliability respectively which are above the planning water supply amount of $50.0{\times}10^6$ton when the simulation method is introduced as the standard.

Terrain Data Construction and FLO-2D Modeling of the Debris-Flow Occurrences Area (토석류 발생지역 지형자료 구축 및 FLO-2D 모델링)

  • Oh, Chae-Yeon;Jun, Kye-Won
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.4
    • /
    • pp.53-61
    • /
    • 2019
  • Occurrences of debris flow are a serious danger to roads and residential located in mountainous areas and cause a lot of property loss. In this study, two basins were selected and spatial data were constructed to simulate the occurred debris flow from mountainous areas. The first basin was to use the Terrestrial LiDAR to scan the debris flow occurrence section and to build terrain data. For the second basin, use drones the sediment in the basin was photographed and DSM (Digital surface model) was generated. And to analyze the effect of the occurrence of debris flow on downstream side, FLO-2D, two-dimensional commercial model, was used to simulate the flow region of the debris flow. And it was compared with the sedimentation area of terrestrial LiDAR and drone measurement data.

A Study on Meayres to Minimize Human Damage in Natural Disaster Vulnerable Areas (자연재해 취약지역 인명피해 최소화 방안에 관한 연구)

  • Seo, Jung Pyo;Cho, Won Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.7 no.1
    • /
    • pp.17-25
    • /
    • 2014
  • Due to the recent climate change impact, natural disasters occur due to sea surface rising, typhoon attacks, flash floods, local heavy rainfalls, landslides, and coastal area erosion, continuing to cause human and property damage. These impacts, coupled with urbanization and industrialization activities, are turning the previously safe areas into disaster-vulnerable areas, increasing human and economic damage. This paper aimed to prepare measures designed to minimize human damage in natural disaster vulnerable parts of South Korea in summer. Toward that end, how vulnerable areas were managed and what the damage was like were studied. Also, cases of human damage and statistics there of were reviewed and analyzed, relevant problems were derived, and thus structural and non-structural measures designed to minimize human damage were presented.

Estimation on the Turbulence Characteristics of Daily Instantaneous Maximum Wind Velocity (일순간최대풍속의 난류특성에 관한 평가)

  • Oh, Jong Seop
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.75-84
    • /
    • 2017
  • This study is concerned with the estimation of daily instantaneous maximum wind velocity in the meteorological major cities (selected each 17 points) during the yearly 1973-2016. The purpose of this paper is to present the turbulence statistic characteristics (probability distribution, correlation coefficient, turbulency intensity, shear velocity, roughness length, turbulence integral length, skewness, and kurtosis) of the daily instantaneous maximum wind velocity. In the processes of analysis, used observations data obtained at Korea Meteorological Adminstration (KMA). The estimation of non-Gaussian load effects for design applications has often been treated tacitly by invoking a conventional wind design load on the basis of Gaussian processes. This assumption breaks down when the instantaneous wind velocity processes exhibits non-Gaussianity. From the analysis results, the probability distribution of the daily instantaneous maximum wind velocity shows a very closed with non-Gaussian in the ensemble population 748, the correlation coefficient shows larger at inland area more than coastal area.

A comparative study on defluoridation capabilities of biosorbents: Isotherm, kinetics, thermodynamics, cost estimation and regeneration study

  • Yihunu, Endashaw Workie;Yu, Haiyan;Junhe, Wen;Kai, Zhang;Teffera, Zebene Lakew;Weldegebrial, Brhane;Limin, Ma
    • Environmental Engineering Research
    • /
    • v.25 no.3
    • /
    • pp.384-392
    • /
    • 2020
  • The presence of high fluoride concentration (> 1.5 mg/L) in water causes serious health problems such as fluorosis, infertility, brain damage, etc., which are endemic to many places in the world. This study has investigated the fluoride removal capacity of the novel activated biochar (BTS) and hydrochar (HTS) using Teff (Eragrostis tef) straw as a precursor. Activated biochar with mesoporous structures and large specific surface area of 627.7 ㎡/g were prepared via pyrolysis process. Low-cost carbonaceous hydrochar were also synthesized by an acid assisted hydrothermal carbonization process. Results obtained from both adsorbents show that the best local maximum fluoride removal was achieved at pH 2, contact time 120 min and agitation speed 200 rpm. The thermodynamic studies proved that the adsorption process was spontaneous and exothermic in nature. Both adsorbents equilibrium data fitted to Langmuir isotherm. However, Freundlich isotherm fitted best for BTS. The maximum fluoride loading capacity of BTS and HTS was found to be 212 and 88.7 mg/g, respectively. The variation could primarily be attributed to a relatively larger Surface area for BTS. Hence, to treat fluoride contaminated water, BTS can be promising as an effective adsorbent.

A User Privacy Protection Scheme based on Password through User Information Virtuality in Cloud Computing (클라우드 컴퓨팅에서 패스워드기반의 사용자 정보 가상화를 통한 사용자 프라이버시 보장 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.29-37
    • /
    • 2011
  • As the area of informatization has been expanding followed by the development of information communication technology, cloud computing which can use infra sources like server, storage, and network in IT area as an efficient service whenever and wherever skyrockets. But users who use cloud computing technology may have some problems like exposure personal data, surveillance on person, and process on commercial purpose on their personal data. This paper proposes a security technique which protect user's privacy by creating imaginary user information not to be used by other people. The proposed technique virtualizes user's information as an anonymity value not to let other people know user's identity by combining PIN code with it and guarantees user's anonymity. Also it can manage and certificate personal information that is important in cloud computing, so that it can solve security problem of cloud computing which centers all informations. Therefore this paper can assist upgrading of the level of information of poor SMBs through safe use of cloud computing.

  • PDF

Security Vulnerability and Countermeasure on 5G Networks: Survey (5G 네트워크의 보안 취약점 및 대응 방안: 서베이)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.197-202
    • /
    • 2019
  • In line with the era of the 4th Industrial Revolution, 5G technology has become common technology, and 5G technology is evaluated as a technology that minimizes the speed and response speed compared to 4G using technologies such as network slicing and ultra-multiple access. 5G NR stands for 5G mobile communication standard, and network slicing cuts the network into parallel connections to optimize the network. In addition, the risk of hacking is increasing as data is processed in the base station unit. In addition, since the number of accessible devices per unit area increases exponentially, there is a possibility of base station attack after hacking a large number of devices in the unit area. To solve this problem, this study proposes the introduction of quantum cryptography and 5G security standardization.

Study of Radiation Mapping System for Water Contamination in Water System (방사능 수치 오염 지도 작성을 위한 방사선 계측 시스템 연구)

  • Na, Teresa W.;Kim, Han Soo;Yeon, Jei Won;Lee, Rena;Ha, Jang Ho
    • Journal of Radiation Industry
    • /
    • v.5 no.2
    • /
    • pp.185-189
    • /
    • 2011
  • As nuclear industry has been developed, a various types of radiological contamination has occurred. After 9.11 terror in U.S.A., it has been concerned that terrorists' active area has been enlarged to use nuclear or radioactive substance. Recently, the most powerful earth-quake stroke, which triggered a massive tsunami in Japan and then Fukushima nuclear power plant reactor has suffered from a serious accident in history. The Fukushima reactor accident has occurred an anxiety of radiation leaks and about 170,000 people have been evacuated from the accidental area near the nuclear power plant. For these reasons, a social chaos can be occurred if radiological contamination occurs to the supply system for the drinking water. As such, the establishment of the radiation monitoring system for the city main water system is compelling for the national security. In this study, a feasibility test of radiation monitoring system which consists of unified hybrid-type radiation detectors was experimented for multi detection system by using gamma-ray imaging. The hybrid-type radiation sensors were fabricated with CsI(Tl) scintillators and photodiodes. A preamplifier and amplifier was also fabricated and assembled with the sensor in the shielding case. For the preliminary test of detection of radiological contamination in the river, multi CsI(Tl)-PIN photodiode radiation detectors and $^{137}Cs$ gamma-ray source were used. The DAQ was done by Linux based ROOT program and NI DAQ system with Labview program. The simulated contamination was assumed to be occurred at Gapcheon river in Daejeon city. Multi CsI(Tl)-PIN photodiode radiation detectors were positioned at the Gapcheon river side. Assuming that the radiological contaminations flows in the river the $^{137}Cs$ gamma-ray source has been moved and then, the contamination region was reconstructed.

Detection of Levee Displacement and Estimation of Vulnerability of Levee Using Remote Sening (원격탐사를 이용한 하천 제방 변위량 측정과 취약지점 선별)

  • Bang, Young Jun;Jung, Hyo Jun;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • As a method of predicting the displacement of river levee in advance, Differential Interferometry (D-InSAR) kind of InSAR techniques was used to identify weak points in the area of the levee collapes near Gumgok Bridge (Somjin River) in Namwon City, which occurred in the summer of 2020. As a result of analyzing the displacement using five images each in the spring and summer of 2020, the Variation Index (V) of area where the collapse occurred was larger than that of the other areas, so the prognostic sysmptoms was detected. If the levee monitoring system is realized by analyzing the correlations with displacement results and hydrometeorological factors, it will overcome the existing limitations of system and advance ultra-precise, automated river levee maintenance technology and improve national disaster management.